UPSmonitor runs as SYSTEM process.
We can communicate with monitor using RMI interface.
In manager app there’s an “Administrator” password check, but the password isn’t verified inside monitor process.
So we can modify any application settings without knowing administrator password.
What is more interesting we can set command which will be executed when monitor get “remote shutdown command”.
Because monitor runs as SYSTEM process, this command is also executed with SYSTEM privileges.
So using this we can create new administrator account.
Proof of Concept:
Below POC sets all necessary options (such as shutdown command path).
Then it sends remote shutdown command to localhost.
After successfull exploitation, new administrator account will be created.
To run the exploit, use the following command:
"C:\Program Files (x86)\MonitorSoftware\jre\bin\java.exe" -classpath ".;C:\Program Files (x86)\MonitorSoftware\otherlib\AdventNetSnmp.jar;C:\Program Files (x86)\MonitorSoftware\Application.jar;C:\Program Files (x86)\MonitorSoftware\otherlib\snmpmanager.jar;C:\Program Files (x86)\MonitorSoftware\otherlib\AdventNetLogging.jar;" WinPowerExploit
- 31-10-2016: Discovered, cannot find software author