# Exploit Title: Unquoted Service Path Vulnerability in Huawei UTPS Software# Date: Nov 16 2016# Author: Dhruv Shah (@Snypter)# Website: http://security-geek.in# Contact: dhruv-shah@live.com# Category: local# Vendor Homepage: http://www.huawei.com/# Version: Versions earlier than UTPS-V200R003B015D16SPC00C983# Tested on: Windows XP , Windows 7-10 x86/x64# CVE: CVE-2016-87691. DescriptionHuawei UTPS Software is the core software that is bundled with theInternet Dongles, it provides it dongles to companies like Airtel ,TATA Photon . This is the software that installs itself for the Dongleto run on the attached machine. It installs as a service ("Photon.RunOUC") and ("Airtel. RunOuc") with an unquoted service path runningwith SYSTEM privileges.This could potentially allow an authorized but non-privileged localuser to execute arbitrary code with elevated privileges on the system.2. Proof of Concept ( TATA PHOTON Dongles)C:\Documents and Settings\Dhruv>sc qc "Photon. RunOuc"[SC] GetServiceConfig SUCCESSSERVICE_NAME: Photon. RunOuc TYPE : 110 WIN32_OWN_PROCESS (interactive) START_TYPE : 2 AUTO_START ERROR_CONTROL : 1 NORMAL BINARY_PATH_NAME : C:\ProgramFiles\Photon\Huawei\EC306-1\UpdateDog\ouc.exe LOAD_ORDER_GROUP : TAG : 0 DISPLAY_NAME : Photon. OUC DEPENDENCIES : SERVICE_START_NAME : LocalSystem( Airtel Dongles)C:\Documents and Settings\Dhruv>sc qc "airtel. Runouc"[SC] GetServiceConfig SUCCESSSERVICE_NAME: airtel. Runouc TYPE : 110 WIN32_OWN_PROCESS (interactive) START_TYPE : 2 AUTO_START ERROR_CONTROL : 1 NORMAL BINARY_PATH_NAME : C:\Program Files\airtel\UpdateDog\ouc.exe LOAD_ORDER_GROUP : TAG : 0 DISPLAY_NAME : airtel. OUC DEPENDENCIES : SERVICE_START_NAME : LocalSystem3. Exploit:A successful attempt would require the local attacker must insert anexecutable filein the path of the service.Upon service restart or system reboot, the malicious code will be runwith elevated privileges.Additional notes :Fixed in version UTPS-V200R003B015D16SPC00C983CVSSv3 Risk RatingBase Score: 6.4 (AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H )Temporal Score: 5.9 (E:F/RL:O/RC:C)Vulnerability Disclosure Timeline:=========================06/09/2016 - Contact With Vendor06/09/2016 - Vendor Response15/11/2016 - Release Fixed Versionhttps://www.exploit-db.com/exploits/40807/ |
2016 m. lapkričio 22 d., antradienis
Huawei UTPS - Unquoted Service Path Privilege Escalation
Užsisakykite:
Rašyti komentarus (Atom)
Komentarų nėra:
Rašyti komentarą