Exploit/Advisories

Published on October 16th, 2019 📆 | 5258 Views ⚑

0

Mikogo 5.2.2.150317 – ‘Mikogo-Service’ Unquoted Serive Path


https://www.ispeech.org/text.to.speech

# Exploit Title : Mikogo 5.2.2.150317 - 'Mikogo-Service' Unquoted Serive Path
# Date : 2019-10-15
# Exploit Author : Cakes
# Vendor: LiteManager Team
# Version : LiteManager 4.5.0
# Software: http://html.tucows.com/preview/518015/Mikogo?q=remote+support
# Tested on Windows 10
# CVE : N/A 


c:>sc qc Mikogo-Service
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: Mikogo-Service
        TYPE               : 110  WIN32_OWN_PROCESS (interactive)
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 1   NORMAL
        BINARY_PATH_NAME   : C:UsersAdministratorAppDataRoamingMikogoMikogo-Service.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : Mikogo-Service
        DEPENDENCIES       :
        SERVICE_START_NAME : LocalSystem
            





https://www.exploit-db.com/exploits/47510

Tagged with:



Comments are closed.