Lucene search

K
zeroscienceGjoko KrsticZSL-2022-5721
HistoryDec 14, 2022 - 12:00 a.m.

SOUND4 Server Service 4.1.102 Local Privilege Escalation

2022-12-1400:00:00
Gjoko Krstic
zeroscience.mk
267
sound4 server
local privilege escalation
unquoted path
windows
vulnerability
zero science lab

Title: SOUND4 Server Service 4.1.102 Local Privilege Escalation
Advisory ID: ZSL-2022-5721
Type: Local
Impact: Privilege Escalation
Risk: (2/5)
Release Date: 14.12.2022

Summary

SOUND4 Windows Server Service.

Description

The application suffers from an unquoted search path issue impacting the service β€˜SOUND4 Server’ for Windows. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user’s code would execute with the elevated privileges of the application.

Vendor

SOUND4 Ltd. - <https://www.sound4.com> | <https://www.sound4.biz>

Affected Version

4.1.102

Tested On

Windows 10 Home 64 bit (build 9200)
SOUND4 Server v4.1.102
SOUND4 Remote Control v4.3.17

Vendor Status

[26.09.2022] Vulnerability discovered.
[30.09.2022] Vendor contacted.
[13.12.2022] No response from the vendor.
[14.12.2022] Public security advisory released.

PoC

sound4_eop.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <https://packetstormsecurity.com/files/170248/SOUND4-Server-Service-4.1.102-Local-Privilege-Escalation.html&gt;
[2] <https://cxsecurity.com/issue/WLB-2022120028&gt;
[3] <https://exchange.xforce.ibmcloud.com/vulnerabilities/247953&gt;
[4] <https://www.exploit-db.com/exploits/51167&gt;

Changelog

[14.12.2022] - Initial release
[28.12.2022] - Added reference [1] and [2]
[20.04.2023] - Added reference [3] and [4]

Contact

Zero Science Lab

Web: <https://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>SOUND4 Server Service 4.1.102 Local Privilege Escalation


Vendor: SOUND4 Ltd.
Product web page: https://www.sound4.com | https://www.sound4.biz
Affected version: 4.1.102

Summary: SOUND4 Windows Server Service.

Desc: The application suffers from an unquoted search path issue impacting
the service 'SOUND4 Server' for Windows. This could potentially allow an
authorized but non-privileged local user to execute arbitrary code with
elevated privileges on the system. A successful attempt would require the
local user to be able to insert their code in the system root path undetected
by the OS or other security applications where it could potentially be executed
during application startup or reboot. If successful, the local user's code
would execute with the elevated privileges of the application.

Tested on: Windows 10 Home 64 bit (build 9200)
           SOUND4 Server v4.1.102
           SOUND4 Remote Control v4.3.17


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
Macedonian Information Security Research and Development Laboratory
Zero Science Lab - https://www.zeroscience.mk - @zeroscience


Advisory ID: ZSL-2022-5721
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5721.php


26.09.2022

--


C:\&gt;sc qc "SOUND4 Server"
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: SOUND4 Server
        TYPE               : 10  WIN32_OWN_PROCESS
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 1   NORMAL
        BINARY_PATH_NAME   : C:\Program Files\SOUND4\Server\SOUND4 Server.exe --service
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : SOUND4 Server
        DEPENDENCIES       :
        SERVICE_START_NAME : LocalSystem

C:\&gt;cacls "C:\Program Files\SOUND4\Server\SOUND4 Server.exe"
C:\Program Files\SOUND4\Server\SOUND4 Server.exe NT AUTHORITY\SYSTEM:(ID)F
                                                 BUILTIN\Administrators:(ID)F
                                                 BUILTIN\Users:(ID)R
                                                 APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(ID)R
                                                 APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(ID)R


C:\Program Files\SOUND4\Server&gt;"SOUND4 Server.exe" -V
4.1.102
</p></body></html>