vendor:
Genexus Protection Server
by:
SamAlucard
6.1
CVSS
HIGH
Unquoted Service Path
428
CWE
Product Name: Genexus Protection Server
Affected Version From: 9.7.2.10
Affected Version To: 9.7.2.10
Patch Exists: NO
Related CWE: CVE-2024-XXXX (Not specified)
CPE: a:genexus:protection_server:9.7.2.10
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/smb/ms17_010_eternalblue, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/unix/webapp/drupal_restws_unserialize, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/scanner/smb/smb_enumshares, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/unix/webapp/thinkphp_rce, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/http/prtg_authenticated_rce, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/admin/networking/cisco_asa_extrabacon, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/scanner/http/iis_internal_ip, https://www.infosecmatter.com/why-your-exploit-completed-but-no-session-was-created-try-these-fixes/, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/unix/webapp/drupal_drupalgeddon2, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/scanner/http/coldfusion_locale_traversal
Platforms Tested: Windows 10 Pro
2024
Genexus Protection Server 9.7.2.10 – Unquoted Service Path Vulnerability
The Genexus Protection Server 9.7.2.10 is vulnerable to an unquoted service path issue, which could allow an attacker to escalate privileges on the system by placing a malicious executable in the path without quotes. This could lead to arbitrary code execution with elevated privileges.
Mitigation:
To mitigate this vulnerability, ensure that all Windows services have their paths quoted properly to prevent unauthorized users from manipulating the path and executing arbitrary code.