Vulnerable Services

We may be able to escalate privileges on well-patched and well-configured systems if users are permitted to install software or vulnerable third-party applications/services are used throughout the organization.

Below we illustrate an example of exploiting a vulnerable 3rd party service.

1 - Enum installed programms

:\hacker> wmic product get name

Name
Microsoft Visual C++ 2019 X64 Minimum Runtime - 14.28.29910
Update for Windows 10 for x64-based Systems (KB4023057)
Microsoft Visual C++ 2019 X86 Additional Runtime - 14.24.28127
VMware Tools
Druva inSync 6.6.3
Microsoft Update Health Tools
Microsoft Visual C++ 2019 X64 Additional Runtime - 14.28.29910
Update for Windows 10 for x64-based Systems (KB4480730)
Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.24.28127

Druva inSync 6.6.3 is vulnerable to a command injection attack via an exposed RPC service. We will us this exploit PoC to privesc.

2 - Confirm Druva is installed and running

Check local port

Check process ID

Check service

3 - Adjust the POC

We change $cmd in the POC to the command of our choice:

4 - Exploit

Bypass the scope:

Then run the exploit

Log out and log back in to get your new token.

Last updated