Description
Sandboxie-Plus 5.50.2 contains an unquoted service path vulnerability in the SbieSvc Windows service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be run with LocalSystem privileges during service startup.
Problem types
Unquoted Search Path or Element
Product status
Credits
Antonio Cuomo (arkantolo)
References
www.exploit-db.com/exploits/50819 (ExploitDB-50819)
sandboxie-plus.com/ (Official Sandboxie-Plus Product Homepage)
www.vulncheck.com/...s-service-sbiesvc-unquoted-service-path (VulnCheck Advisory: Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path)