I’ve written a few articles recently about methods of escalating privileges on Windows machines, such as through DLL Hijacking and Unquoted Service Paths, so here I’m continuing the series with Privilege Escalation through Insecure Service configurations. This one’s pretty simple issue really, generally speaking it’s simply a matter of altering the service so that it runs the executable and parameters you want it to, instead the default configuration allowing you to supply a command and privilege level for the execution. So you can simply run the add user command as local system and create your own local administrator account!
The first step in the detection is to find a service with weak permissions, this can be done with the accesschk tool from Sysinternals, which is available here.
You can execute the command as follows to list potentially vulnerable services:
accesschk.exe -uwcqv *
This will show list each service and the groups which have write permissions to that service – if you have an account in any of these groups then you’ve potentially got privilege escalation. If the output of the above command is a little too much to dig through, you could instead supply a group and it will limit output to services that group has write permission to, as:
accesschk.exe -uwcqv "Group Name" *
e.g.
accesschk.exe -uwcqv "Authenticated Users" *
accesschk.exe -uwcqv "Everyone" *
The output will be the service name, the group name and the permissions that group has. Anything like SERVICE_CHANGE_CONFIG or SERVICE_ALL_ACCESS is a win. In fact any of the following permissions are worth looking out for:
SERVICE_CHANGE_CONFIG
SERVICE_ALL_ACCESS
GENERIC_WRITE
GENERIC_ALL
WRITE_DAC
WRITE_OWNER
If you have reconfiguration permissions, or can get them through the above permission list, then you can use the SC command to exploit the vulnerability:
sc config SERVICENAME binPath= "E:\Service.exe"
sc config SERVICENAME obj=".\LocalSystem" password=""
net stop SERVICENAME
net start SERVICENAME
Stop and start the service again and you’re a Local Admin!
The fix for this one is fairly simple, lower privilege accounts such as domain users and their associated groups such as “Everyone” and “Authenticated Users” should not have any of the dangerous permissions listed above. The easiest thing to do, if possible, is to remove any vulnerable services.
However if that is not possible and the service’s permission must be reconfigured then be warned that this isn’t the simplest process from the command line. However, you can use Process Explorer to modify permissions with a GUI.
Play | Cover | Release Label |
Track Title Track Authors |
---|