Advertisement






WampServer 3.0.6 - Insecure File Permissions

CVE Category Price Severity
CVE-2021-1835 CWE-276 $500 High
Author Risk Exploitation Type Date
Unknown High Local 2016-09-30
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2016090218

Below is a copy:

WampServer 3.0.6 - Insecure File PermissionsDocument Title:
===============
WampServer 3.0.6 - Insecure File Permissions


Release Date:
=============
2016-09-23


Vulnerability Disclosure Timeline:
==================================
2016-09-30 : Public Disclosure


Product & Service Introduction:
===============================
WampServer (Formerly WAMP5) is a Web development platform WAMP type, for operating locally (without connecting to an external server) PHP scripts. WampServer is not in itself a software but an environment with two servers (Apache and MySQL), a script interpreter (PHP) and phpMyAdmin for administration Web MySQL databases.

(Copy of the Vendor Homepage: http://www.wampserver.com/ )


Affected Product(s):
====================
Product: WampServer v3.0.6 - Software


Exploitation Technique:
=======================
Local


Severity Level:
===============
Medium


Technical Details & Description:
================================
Insecure File Permissions vulnerability has been discovered in the official WampServer v3.0.6 software.
The vulnerability exists due to insecure default permissions set on the wampmanager.exe and unins000.exe  

A local attacker could exploit this vulnerability by replacing wampmanager.exe or unins000.exe with a malicious executable file.  
The malicious file could execute or modify with the LocalSystem permissions. 


Proof of Concept (PoC):
=======================
WampServer for Windows contains a vulnerability that could allow a local attacker to gain elevated privileges.

-- PoC Exploit --

C:wampp>icacls wampmanager.exe
wampmanager.exe BUILTINAdministrateurs:(I)(F)    <--- Full Acces
                AUTORITE NTSystme:(I)(F)
                BUILTINUtilisateurs:(I)(RX)
                AUTORITE NTUtilisateurs authentifis:(I)(M)   <--- Modify

1 fichiers correctement traits ; chec du traitement de 0 fichiers

C:wampp>icacls unins000.exe
unins000.exe BUILTINAdministrateurs:(I)(F)   <--- Full Acces
             AUTORITE NTSystme:(I)(F)
             BUILTINUtilisateurs:(I)(RX)
             AUTORITE NTUtilisateurs authentifis:(I)(M)   <--- Modify

1 fichiers correctement traits ; chec du traitement de 0 fichiers

[+] Disclaimer [+]
===================
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author.
The author is not responsible for any misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere.


Domain:     www.zwx.fr
Contact:    [email protected]
Social:     twitter.com/XSSed.fr
Feeds:      www.zwx.fr/feed/
Advisory:   www.vulnerability-lab.com/show.php?user=ZwX
            packetstormsecurity.com/files/author/12026/
            cxsecurity.com/search/author/DESC/AND/FIND/0/10/ZwX/
            0day.today/author/27461


                     Copyright  2016 | ZwX - Security Researcher (Software & web application)

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum