Kiteservice 1.2020.618.0 unquoted service path Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2020-06-26 |
Type : local |
Platform : windows
This exploit / vulnerability Kiteservice 1.2020.618.0 unquoted service path is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
# Exploit Title: KiteService 1.2020.618.0 - Unquoted Service Path
# Discovery by: PoisonSk
# Discovery Date: 2020-06-23
# Vendor Homepage: https://www.kite.com/
# Software Link : https://www.kite.com/download/
# Tested Version: 1.2020.618.0
# Vulnerability Type: Unquoted Service Path
# Tested on OS: Microsoft Windows 10 Home Single 10.0.18363 N/D Compilación 18363
# Steps to discover unquoted Service Path:
C:\Users>wmic service get name,pathname,displayname,startmode | findstr /i auto | findstr /i "program " | findstr /i /v """
KiteService KiteService C:\Program Files\Kite\KiteService.exe Auto
# Exploit:
#A successful attempt would require the local attacker must insert an executable file in the path of the service.
#Upon service restart or system reboot, the malicious code will be run with elevated privileges.