header-logo
Suggest Exploit
vendor:
DiskBoss Service
by:
Erick Galindo
7.8
CVSS
HIGH
Unquoted Service Path
427
CWE
Product Name: DiskBoss Service
Affected Version From: 12.2.18
Affected Version To: 12.2.18
Patch Exists: NO
Related CWE: N/A
CPE: //a:diskboss
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Pro x64 es
2021

DiskBoss Service 12.2.18 – ‘diskbsa.exe’ Unquoted Service Path

This vulnerability could permit executing code during startup or reboot with the escalated privileges. An attacker could exploit this vulnerability by placing a malicious executable in the same directory as the unquoted service path.

Mitigation:

Ensure that all services have a fully qualified path to the executable.
Source

Exploit-DB raw data:

# Exploit Title: DiskBoss Service 12.2.18 - 'diskbsa.exe' Unquoted Service Path
# Discovery by: Erick Galindo 
# Discovery Date: 2021-05-21
# Vendor Homepage: https://www.diskboss.com
# Software :  https://www.diskboss.com/setups_x64/diskboss_setup_v12.2.18_x64.exe
# Tested Version: 12.2.18
# Vulnerability Type: Unquoted Service Path
# Tested on OS: Windows 10 Pro  x64 es
# Step to discover Unquoted Service Path:

C:\>wmic service get name, pathname, displayname, startmode | findstr "Auto" | findstr /i /v "C:\Windows\\" | findstr /i "DiskBoss" | findstr /i /v """
DiskBoss Service                 DiskBoss Service            C:\Program Files\DiskBoss\bin\diskbsa.exe                   Auto

# Service info

C:\>sc qc "DiskBoss Service"
[SC] QueryServiceConfig CORRECTO

NOMBRE_SERVICIO: DiskBoss Service
        TIPO               : 10  WIN32_OWN_PROCESS
        TIPO_INICIO        : 2   AUTO_START
        CONTROL_ERROR      : 0   IGNORE
        NOMBRE_RUTA_BINARIO: C:\Program Files\DiskBoss\bin\diskbsa.exe
        GRUPO_ORDEN_CARGA  :
        ETIQUETA           : 0
        NOMBRE_MOSTRAR     : DiskBoss Service
        DEPENDENCIAS       :
        NOMBRE_INICIO_SERVICIO: LocalSystem

#Exploit:

This vulnerability could permit executing code during startup or reboot with the escalated privileges.