Lucene search

K

InsOnSrv Asus InstantOn 2.3.1.1 Privilege Escalation

🗓️ 13 Oct 2016 00:00:00Reported by Cyril VallicariType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 18 Views

InsOnSrv Asus InstantOn 2.3.1.1 Privilege Escalation Unquoted Service Path vulnerability impacting Window

Show more
Code
`# Exploit Title: InsOnSrv Asus InstantOn- Privilege Escalation Unquoted Service Path vulnerability  
# Date: 13/10/2016  
# Exploit Author : Cyril Vallicari  
# Vendor Homepage: www.asus.com  
# Version: 2.3.1.1  
# Tested on: Windows 7 x64 SP1 (but it should works on all windows version)  
  
The application suffers from an unquoted service path issue impacting the service 'ASUS InstantOn (InsOnSrv.exe)' deployed as part of Asus InstantOn  
This could potentially allow an authorized but non-privileged local user to execute arbitrary code with system privileges.  
  
POC :  
  
  
C:\Users\Utilisateur>sc qc "ASUS InstantOn"  
[SC] QueryServiceConfig rA(c)ussite(s)  
  
SERVICE_NAME: ASUS InstantOn  
TYPE : 10 WIN32_OWN_PROCESS  
START_TYPE : 2 AUTO_START  
ERROR_CONTROL : 1 NORMAL  
BINARY_PATH_NAME : C:\Program Files (x86)\ASUS\ASUS InstantOn\InsOnSrv.exe  
LOAD_ORDER_GROUP :  
TAG : 0  
DISPLAY_NAME : ASUS InstantOn Service  
DEPENDENCIES :  
SERVICE_START_NAME : LocalSystem  
  
Additional notes :  
  
https://hackerone.com/blog/asus-vulnerability-disclosure-deja-vu  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
13 Oct 2016 00:00Current
0.5Low risk
Vulners AI Score0.5
18
.json
Report