header-logo
Suggest Exploit
vendor:
Lotus Notes
by:
Mert DAS
7.2
CVSS
HIGH
Unquoted Service Path
22
CWE
Product Name: Lotus Notes
Affected Version From: V12
Affected Version To: V12
Patch Exists: NO
Related CWE:
CPE: hcl:lotus_notes
Metasploit:
Other Scripts:
Platforms Tested: Windows 10
2021

HCL Lotus Notes V12- Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Mitigation:

Ensure that all services are configured with a fully qualified path to the executable, and that the path is enclosed in quotes.
Source

Exploit-DB raw data:

# Exploit Title: HCL Lotus Notes V12- Unquoted Service Path
# Exploit Author: Mert DAŞ
# Version: V12
# Date: 01/12/2021
# Vendor Homepage: https://www.hcltechsw.com/domino/download
# Tested on: Windows 10


ProcessId   : 3860
Name        : LNSUSvc
DisplayName : HCL Notes Smart Upgrade Hizmeti
PathName    : c:\HCL\Notes\SUService.exe
StartName   : LocalSystem
StartMode   : Auto
State       : Running

Discovery
-------------------------
C:\Users\Mert>wmic service get name,displayname,pathname,startmode |findstr /i "auto" |findstr /i /v "c:\windows\\" |findstr /i /v """


#Exploit:

A successful attempt would require the local user to be able to insert
their code in the system root path undetected by the OS or other security
applications where it could potentially be executed during application
startup or reboot. If successful, the local user's code would execute with
the elevated privileges of the application.