Share
## https://sploitus.com/exploit?id=PACKETSTORM:160378
# Exploit Title: Kite 1.2020.1119.0 - 'KiteService' Unquoted Service Path  
# Discovery by: Ismael Nava  
# Discovery Date: 05-12-2020  
# Vendor Homepage: https://www.kite.com/  
# Software Links : https://www.kite.com/download/  
# Tested Version: 1.2020.1119.0  
# Vulnerability Type: Unquoted Service Path  
# Tested on OS: Windows 10 64 bits  
  
# Step to discover Unquoted Service Path:  
  
C:\>wmic service get name, displayname, pathname, startmode | findstr /i "Auto" | findstr /i /v "C:\Windows\\" |findstr /i /v """  
KiteService KiteService C:\Program Files\Kite\KiteService.exe Auto  
  
  
C:\>sc qc "KiteService"  
[SC] QueryServiceConfig CORRECTO  
  
NOMBRE_SERVICIO: KiteService  
TIPO : 10 WIN32_OWN_PROCESS  
TIPO_INICIO : 2 AUTO_START  
CONTROL_ERROR : 0 IGNORE  
NOMBRE_RUTA_BINARIO: C:\Program Files\Kite\KiteService.exe  
GRUPO_ORDEN_CARGA :  
ETIQUETA : 0  
NOMBRE_MOSTRAR : KiteService  
DEPENDENCIAS :  
NOMBRE_INICIO_SERVICIO: LocalSystem