Files
CVEs-PoC/2017/CVE-2017-7180.md
T
2024-06-18 02:51:15 +02:00

18 lines
949 B
Markdown

### [CVE-2017-7180](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7180)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Net Monitor for Employees Pro through 5.3.4 has an unquoted service path, which allows a Security Feature Bypass of its documented "Block applications" design goal. The local attacker must have privileges to write to program.exe in a protected directory, such as the %SYSTEMDRIVE% directory, and thus the issue is not interpreted as a direct privilege escalation. However, the local attacker might have the goal of executing program.exe even though program.exe is a blocked application.
### POC
#### Reference
- https://www.exploit-db.com/exploits/42141/
#### Github
No PoCs found on GitHub currently.