Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
992Proxy

Locked Macro Expert 4.0 Privilege Escalation


dEEpEst

Recommended Posts

[HIDE-THANKS]# Exploit Title: Macro Expert 4.0 Multiple Elevation of Privilege

# Date: 26/09/2016

# Exploit Author: Tulpa

# Contact: [email protected]

# Author website:

This is the hidden content, please

# Vendor Homepage:

This is the hidden content, please

# Software Link:

This is the hidden content, please

# Version: Software Version 4.0

# Tested on: Windows 7 x86

# Shout-out to carbonated and ozzie_offsec

 

1. Description:

Macro Expert installs as a service with an unquoted service path running with SYSTEM

 

privileges. This could potentially allow an authorized but non-privileged local

user to execute arbitrary code with elevated privileges on the system. Additionally the

 

default installation path suffers from weak folder permission which an unauthorized user

 

in the BUILTINUsers group could take advantage of.

 

2. Proof

 

C:Program FilesGrassSoft>sc qc "Macro Expert"

[sC] QueryServiceConfig SUCCESS

 

SERVICE_NAME: Macro Expert

TYPE : 10 WIN32_OWN_PROCESS

START_TYPE : 2 AUTO_START

ERROR_CONTROL : 1 NORMAL

BINARY_PATH_NAME : c:program filesgrasssoftmacro expertMacroService.exe

LOAD_ORDER_GROUP :

TAG : 0

DISPLAY_NAME : Macro Expert

DEPENDENCIES :

SERVICE_START_NAME : LocalSystem

 

C:Program FilesGrassSoft>cacls "Macro Expert"

C:Program FilesGrassSoftMacro Expert BUILTINUsers:(OI)(CI)C

NT SERVICETrustedInstaller:(ID)F

NT SERVICETrustedInstaller:(CI)(IO)(ID)F

NT AUTHORITYSYSTEM:(ID)F

NT AUTHORITYSYSTEM:(OI)(CI)(IO)(ID)F

BUILTINAdministrators:(ID)F

BUILTINAdministrators:(OI)(CI)(IO)(ID)F

BUILTINUsers:(ID)R

BUILTINUsers:(OI)(CI)(IO)(ID)(special access:)

GENERIC_READ

 

GENERIC_EXECUTE

 

CREATOR OWNER:(OI)(CI)(IO)(ID)F

 

 

3. Exploit:

 

A successful attempt would require the local user to be able to insert their

code in the system root path undetected by the OS or other security applications

where it could potentially be executed during application startup or reboot.

If successful, the local user's code would execute with the elevated privileges

of the application.[/HIDE-THANKS]

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.