Sysax FTP Automation Server 5.33 - Local Privilege Escalation
2012-11-04T00:00:00
ID EDB-ID:22465 Type exploitdb Reporter Craig Freyman Modified 2012-11-04T00:00:00
Description
Sysax FTP Automation Server 5.33 - Local Privilege Escalation. Local exploit for windows platform
#Title: Sysax FTP Automation Server Local Privilege Escalation
#Author: Craig Freyman (@cd1zz)
#OS Tested: XP SP3 32bit
#Version Tested: 5.33
#Date Discovered: October 1, 2012
#Vendor Contacted: October 21, 2012
#Vendor Response: November 1, 2012
#Demo: http://www.pwnag3.com/2012/11/sysax-ftp-automation-server-privilege.html
Sysax FTP Automation <= 5.33 has a privilege escalation vulnerability. This can be exploited
by leveraging the Scheduled Script -> Scheduled Task functionality. The scheduled task
function allows you to run any external program/execuable you want, without specifying
credentials. By default, this product installs under the LOCALSYSTEM service so when the
binary is executed, it runs under that context.
Sysax fixed this problem in version 5.34.
{"id": "EDB-ID:22465", "hash": "ba245735c09267a271490ed488a62aad", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Sysax FTP Automation Server 5.33 - Local Privilege Escalation", "description": "Sysax FTP Automation Server 5.33 - Local Privilege Escalation. Local exploit for windows platform", "published": "2012-11-04T00:00:00", "modified": "2012-11-04T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/22465/", "reporter": "Craig Freyman", "references": [], "cvelist": [], "lastseen": "2016-02-02T18:48:22", "history": [], "viewCount": 15, "enchantments": {"score": {"value": 7.2, "vector": "NONE"}, "dependencies": {"references": [], "modified": "2016-02-02T18:48:22"}, "vulnersScore": 7.2}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/22465/", "sourceData": "#Title: Sysax FTP Automation Server Local Privilege Escalation\r\n#Author: Craig Freyman (@cd1zz)\r\n#OS Tested: XP SP3 32bit\r\n#Version Tested: 5.33\r\n#Date Discovered: October 1, 2012\r\n#Vendor Contacted: October 21, 2012\r\n#Vendor Response: November 1, 2012\r\n#Demo: http://www.pwnag3.com/2012/11/sysax-ftp-automation-server-privilege.html\r\n\r\nSysax FTP Automation <= 5.33 has a privilege escalation vulnerability. This can be exploited\r\nby leveraging the Scheduled Script -> Scheduled Task functionality. The scheduled task \r\nfunction allows you to run any external program/execuable you want, without specifying \r\ncredentials. By default, this product installs under the LOCALSYSTEM service so when the \r\nbinary is executed, it runs under that context. \r\n\r\nSysax fixed this problem in version 5.34. \r\n", "osvdbidlist": ["87137"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}