Unquoted service-path exploitation
In this recipe, we are going to exploiting and gaining the additional privileges of a high-level user over an unquoted service path. First, let us understand what an unquoted service path is. What we are talking about is the path related to the service binary that is specified/configured without quotes. This specifically works only when a low-privilege user has been given access to the system drive. This generally happens in corporate networks where a user is given exception to add files.Let us have a look at the following screenshot to better understand this problem:
If we look at the path to the executable, it is specified without quotes. In this case, the execution method of Windows can be bypassed. When the path has a space in between, and is not specified in quotes, Windows basically executes in the following manner:
C:\Program.exe C:\Program\FilesSome.exe C:\Program\FilesSome\FolderService.exe
In the preceding situation, the Foxit Cloud...