Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Privilege escalation in QQBrowser

NotificationsYou must be signed in to change notification settings

seqred-s-a/CVE-2020-10551

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

CVEID: CVE-2020-10551

Name of the affected product(s) and version(s): QQBrowser (all versions prior to 10.5.3870.400)

Problem type: CWE-284: Improper Access Control


Summary

QQBrowser is a web browser developed by Tencent. It is one of the most popular web browsers used in China.During our tests, we have found a vulnerability which allows an unprivileged local attacker to gain codeexecution as NT AUTHORITY\SYSTEM.

All version of QQBrowser prior to 10.5.3870.400 do not correctly set up ACLs for a TsService.exe file.A malicious local attacker could overwrite the file to gain access to NT AUTHORITY\SYSTEM account, whichis the highest privileged account on a Windows system.

Description

QQBrowser creates a Windows service with ImagePath pointing to a TsService.exe file in its installation directory(default: C:\Program Files (x86)\Tencent\QQBrowser\TsService.exe). This file’s permissions allow for writing by membersof NT AUTHORITY\Authenticated Users group which by default includes all users. An attacker could exploit the vulnerabilityby replacing TsService.exe with his own executable, which would then be invoked with NT AUTHORITY\SYSTEM privileges.

Reproduction

Delete TsService.exe and replace it with a different program. Reboot the system.

Remedy

Install a newer version of QQBrowser.


[8]ページ先頭

©2009-2025 Movatter.jp