Skip to content

xNymia/OverwolfServicePrivEsc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Local Privilege escalation via Overwolf service

Disclosure

  • 2018/12/15 - Initial disclosure email sent to support@overwolf.com
  • 2018/12/24 - Overwolf identified the issue and are in remediation phase
  • 2019/1/8 - This should be patched in v122
  • 2019/1/n - Overwolf release version 122 with fix included
  • 2019/2/6 - Tested and confirmed fixed
  • 2019/2/6 - Public Disclosure.

Overwolf were a pleasure to work with in resolving this, thank you to 'LEOkonami' for being a very helpful point of contact!

Summary

The Overwolf Platform, used to manage game related plugins, create a system service (OverwolfUpdater) with weak security permissions applied to the service binary that allows it to be modified, this would to allow an unprivilaged user to perform a privilage escalation attack. This can be used to attain system level access.

This is a privilege escalation exploit and would not initially compromise a host.

Vulnerability Impact

Remediation

Service binaries and directories should be generated with appropriately secure security permissions to prevent malicious modification of the service binary.

Proof Of Concept

This can be fairly trivally exploited with the metasploit framework.

Once initial compromise has taken place:

Initial Compromise

The live meterpreter session is detached and then the MSF exploit: windows/local/service_permissions is executed with a further meterpreter payload:

exploitation

A system shell is then presented very shortly afterwards:

system

About

Unprivileged to System via Overwolf Service

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published