Description
WorkgroupMail 7.5.1 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be run with LocalSystem privileges during service startup.
Problem types
Unquoted Search Path or Element
Product status
Credits
Cakes
References
www.exploit-db.com/exploits/47523 (ExploitDB-47523)
html.tucows.com/...w/195580/WorkgroupMail-Mail-Server?q=pop3 (WorkgroupMail Software Download Page)
www.vulncheck.com/...ail-workgroupmail-unquoted-service-path (VulnCheck Advisory: WorkgroupMail 7.5.1 - 'WorkgroupMail' Unquoted Service Path)