Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-39959 PoC — Panini Everest Engine 代码问题漏洞

Source
Associated Vulnerability
Title:Panini Everest Engine 代码问题漏洞 (CVE-2022-39959)
Description:Panini Everest Engine是Panini公司的一个 Windows 服务驱动程序。 Panini Everest Engine 2.0.4版本存在安全漏洞,该漏洞源于允许非特权用户在 %PROGRAMDATA%Panini 文件夹中创建名为 Everest.exe 的文件,攻击者利用该漏洞可以提升权限。
Description
CVE-2022-39959
Readme
# CVE-2022-39959

###### Affected Vendor- Panini https://www.panini.com/en
###### Affected Product - Panini Everest Engine
###### Affected Version - 2.0.4

There is an Unquoted Service Path in Everest Engine(EverestEngine.exe) in version **2.0.4** on Windows. This allows an unauthorized local user to insert arbitrary code into the unquoted service path and escalate privileges to system


**File Path:** C:\ProgramData\Panini\Everest Engine


#### Exploit
Add arbitrary code named Everest.exe file to the unquoted path %PROGRAMDATA%\Panini and once system is rebooted or service restarted the attacker will gain system privileges to the system

##### Impact
Escalation to System Privileges



File Snapshot

[4.0K] /data/pocs/2aa6198df0481cc4d5a7bfe52b53dc17be28d012 └── [ 695] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.