module

Windscribe WindscribeService Named Pipe Privilege Escalation

Disclosed
2018-05-24
Created
2020-02-06

Description

The Windscribe VPN client application for Windows makes use of a
Windows service `WindscribeService.exe` which exposes a named pipe
`\.\pipe\WindscribeService` allowing execution of programs with
elevated privileges.

Windscribe versions prior to 1.82 do not validate user-supplied
program names, allowing execution of arbitrary commands as SYSTEM.

This module has been tested successfully on Windscribe versions
1.80 and 1.81 on Windows 7 SP1 (x64).

Authors

Emin Ghuliev
bcoles bcoles@gmail.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/local/windscribe_windscribeservice_priv_esc
msf exploit(windscribe_windscribeservice_priv_esc) > show targets
...targets...
msf exploit(windscribe_windscribeservice_priv_esc) > set TARGET < target-id >
msf exploit(windscribe_windscribeservice_priv_esc) > show options
...show and set options...
msf exploit(windscribe_windscribeservice_priv_esc) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.