vendor:
IPass Client
by:
Matthias Kaiser, h0ng10
N/A
CVSS
N/A
Remote Command Execution
264
CWE
Product Name: IPass Client
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: CVE-2015-0925
CPE: N/A
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/smb/ipass_pipe_exec, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/local/ipass_launch_app, https://www.infosecmatter.com/list-of-metasploit-windows-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/nessus-plugin-library/?id=70112, https://www.infosecmatter.com/nessus-plugin-library/?id=76851, https://www.infosecmatter.com/nessus-plugin-library/?id=76783, https://www.infosecmatter.com/nessus-plugin-library/?id=79113, https://www.infosecmatter.com/nessus-plugin-library/?id=77355, https://www.infosecmatter.com/nessus-plugin-library/?id=79037, https://www.infosecmatter.com/nessus-plugin-library/?id=76613
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows x32, Windows x64
2015
IPass Control Pipe Remote Command Execution
This module exploits a vulnerability in the IPass Client service. This service provides a named pipe which can be accessed by the user group BUILTINUsers. This pipe can be abused to force the service to load a DLL from a SMB share.
Mitigation:
No known mitigation or remediation for this vulnerability