# Exploit Title: WinPower V4.9.0.4 Privilege Escalation # Date: 29-11-2016 # Software Link: http://ift.tt/2fXhXfD # Exploit Author: Kacper Szurek # Contact: http://twitter.com/KacperSzurek # Website: http://ift.tt/1AaOgjR # Category: local 1. Description UPSmonitor runs as SYSTEM process. We can communicate with monitor using RMI interface. In manager app there’s an “Administrator” password check, but the password isn’t verified inside monitor process. So we can modify any application settings without knowing administrator password. What is more interesting we can set command which will be executed when monitor get “remote shutdown command”. Because monitor runs as SYSTEM process, this command is also executed with SYSTEM privileges. So using this we can create new administrator account. http://ift.tt/2gBP8sJ 2. Proof of Concept http://ift.tt/2gZFkZS http://ift.tt/2gN340m
Source: Gmail -> IFTTT-> Blogger
No comments:
Post a Comment