Skip to content

Instantly share code, notes, and snippets.

@blackcon
Last active September 9, 2020 01:13
Show Gist options
  • Save blackcon/ae155656d21a2228aa25fdcb79c85159 to your computer and use it in GitHub Desktop.
Save blackcon/ae155656d21a2228aa25fdcb79c85159 to your computer and use it in GitHub Desktop.
1. Vulnerability
- DLL Search Order Hijacking Vulnerability (LPE)
2. Product
- product: raonk.svc.exe (version: 2018.0.0.10)
- company: RAONWIZ Inc
3. Vulnerebility Version
- before 2018.0.0.10
4. Update Version
- Not yet
5. Describe vulnerability
- read this apply
https://gist.github.com/blackcon/ae155656d21a2228aa25fdcb79c85159#gistcomment-3445913
6. Reference URL
- http://www.raonk.com/page/intro/solution_intro.aspx
- https://resources.infosecinstitute.com/dll-hijacking-attacks-revisited/#gref
7. Discoverer
- Jihwan Yoon in NBP(NAVER BUSINESS PLATFORM)
- Security Engineer
- Service : https://www.ncloud.com, https://www.naver.com
@blackcon
Copy link
Author

blackcon commented Sep 8, 2020

5. Proof

1) Load DLL List

raonk_001

2) move the new DLL for hijacking and restart the service(raonk.svc)

raonk_002

3) Success dll hijacking and execute commnad as SYSTEM auth.

raonk_003

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment