# Cobian Backup 0.9 未加引号服务路径漏洞
N/A
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: CobianSoft - The home of Cobian Backup -- 🔗来源链接
标签:product
神龙速读:
- **Cookie Consent POPUP**: Displayed, site seeks user consent for personal data usage
- **Privacy Practices**: Explicitly mentioning data processing, storage & sharing with vendors/ad partners
- **User Control**: Offers "Manage options" & "Consent" for user data choice
标题: Cobian Backup 0.9 - Unquoted Service Path - Windows local Exploit -- 🔗来源链接
标签:exploit
神龙速读:
### 关键漏洞信息
- **漏洞名称**: Cobian Backup 0.9 - Unquoted Service Path
- **EDB-ID**: 50810
- **CVE**: N/A
- **作者**: HEJAP ZAIRY AL-SHARIF
- **类型**: LOCAL
- **平台**: WINDOWS
- **日期**: 2022-03-09
- **易受攻击的应用**: 无明确提及
- **验证**: EDB未验证
### 漏洞细节
- **漏洞标题**: Cobian Backup 0.9 - Unquoted Service Path
- **日期**: 06/03/2022
- **漏洞作者**: Hejap Zairy
- **供应商主页**: https://www.cobiansoft.com/
- **软件链接**: https://www.cobiansoft.com/download.php/
- **版本**: 0.9.93
- **测试环境**: Windows 10 Pro x64
### 技术细节
```plaintext
C:\Users\Hejap>sc qc CobianReflectorService
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: CobianReflectorService
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
```
### 其他信息
- **标签**: 无显示标签
- **咨询/来源**: 链接(具体链接未提供)
标题: CobianSoft - The home of Cobian Backup -- 🔗来源链接
标签:product
神龙速读:
从提供的网页截图内容中,以下是一些与漏洞关键信息相关的简洁Markdown总结:
- **错误信息:**
下载部分提示“Wrong software id.”
- **权限请求:**
- 用户数据被用于个性化广告、内容开发及受众研究等。
- 用户数据可能被存储和访问,涉及141个TCF供应商和69个广告合作伙伴。
- 用户可以通过“Manage options”或“Consent”按钮来管理其隐私和cookie设置。
- **版权信息:**
网站内容属于2019年Luis Cobian所有,并包含GDPR和Cookie政策链接。
这些信息可能帮助识别网站数据处理、用户权限管理及隐私设置方面的潜在漏洞或配置问题。
标题: Cobian Backup 0.9 - Unquoted Service Path | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
## Vulnerability Information
- **Title**: Cobian Backup 0.9 - Unquoted Service Path
- **Severity**: High
- **Date**: January 13, 2026
- **Affected Software**: Cobian Backup 0.9.93
- **CVSS Score**: 8.8
- **CVSS Vector**: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/SC:H/CI:H/II:H/AVI:N/VI:N/SC:N/SI:N/SA:N
- **CVE ID**: CVE-2022-50923
- **CWE ID**: CWE-428 Unquoted Search Path or Element
- **References**:
- [ExploitDB-50810](#)
- [Vendor Homepage](#)
- [Software Download Page](#)
- **Credit**: Hejap Zairy
- **Description**: Cobian Backup 0.9 contains an unquoted service path vulnerability that allows local users to execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in the CobianReflectorService to inject malicious code that will execute with LocalSystem permissions during service startup.
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.