Unquoted Service Paths
Last updated
Last updated
If the path to a service (which runs on SYSTEM, for example) doesn’t have quotes around it, then it’s vulnerable. Let’s say there’s a program called program.exe with the path
Then in the below path, the asterisks are all places you can put your own program.exe to have it get executed when the service gets restarted.
Note that you might need to be an admin to write under C:\, but who knows, maybe the subdirectories will allow it.
One-liner to check existence:
Metasploit module: exploit/windows/local/trusted_service_path