Description
Serviio PRO 1.8 contains an unquoted search path vulnerability in the Windows service that allows local users to execute arbitrary code with elevated privileges by placing malicious executables in the system root path. Additionally, improper directory permissions with full access for the Users group allow authenticated users to replace the executable file with arbitrary binaries, enabling privilege escalation during service startup or system reboot.
Problem types
Unquoted Search Path or Element
Product status
1.7.1
1.7.0
1.6.1
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5405.php (Zero Science Lab Disclosure)
blogs.securiteam.com/index.php/archives/3094 (SecuriTeam Blogs)
www.exploit-db.com/exploits/41959/ (Exploit-DB)
packetstormsecurity.com/files/142384 (Packet Storm Security)
cxsecurity.com/issue/WLB-2017050019 (CXSecurity)
exchange.xforce.ibmcloud.com/vulnerabilities/125644 (IBM X-Force Exchange)
www.vulncheck.com/...-privilege-escalation-via-unquoted-path (VulnCheck Advisory: Serviio PRO 1.8 Local Privilege Escalation via Unquoted Path)