header-logo
Suggest Exploit
vendor:
SysGauge Server
by:
Brian Rodriguez
7,8
CVSS
HIGH
Unquoted Service Path
426
CWE
Product Name: SysGauge Server
Affected Version From: 7.9.18
Affected Version To: 7.9.18
Patch Exists: NO
Related CWE: N/A
CPE: a:sysgauge:sysgauge_server:7.9.18
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 10 Enterprise 64 bits
2021

SysGauge 7.9.18 – ‘ SysGauge Server’ Unquoted Service Path

SysGauge 7.9.18 is vulnerable to Unquoted Service Path vulnerability. This vulnerability can be exploited by an attacker to gain elevated privileges on the system. The vulnerability exists due to the SysGauge Server service not properly quoting its path. An attacker can exploit this vulnerability by placing malicious files in the same directory as the service executable and then start the service.

Mitigation:

Ensure that all services have their paths properly quoted. This can be done by using the sc.exe utility to query and set the service configuration.
Source

Exploit-DB raw data:

# Exploit Title: SysGauge 7.9.18 - ' SysGauge Server' Unquoted Service Path
# Discovery by: Brian Rodriguez
# Date: 14-06-2021
# Vendor Homepage:  https://www.sysgauge.com
# Software Link: https://www.sysgauge.com/setups/sysgaugesrv_setup_v7.9.18.exe
# Tested Version: 7.9.18
# Vulnerability Type: Unquoted Service Path
# Tested on: Windows 10 Enterprise 64 bits

# Step to discover Unquoted Service Path:

C:\>wmic service get name,displayname,pathname,startmode |findstr /i "auto"
|findstr /i /v "c:\windows\\" |findstr /i /v """

C:\>sc qc "SysGauge Server"
[SC] QueryServiceConfig CORRECTO

NOMBRE_SERVICIO: SysGauge Server
        TIPO               : 10  WIN32_OWN_PROCESS
        TIPO_INICIO        : 2   AUTO_START
        CONTROL_ERROR      : 0   IGNORE
        NOMBRE_RUTA_BINARIO: C:\Program Files\SysGauge
Server\bin\sysgaus.exe
        GRUPO_ORDEN_CARGA  :
        ETIQUETA           : 0
        NOMBRE_MOSTRAR     : SysGauge Server
        DEPENDENCIAS       :
        NOMBRE_INICIO_SERVICIO: LocalSystem