# Exploit Title: HealthMonitor 3.1 - Unquoted Service Path # Discovery by: yunaranyancat # Discovery Date: October 2020 # Vendor Homepage: https://sourceforge.net/projects/healthmonitor/ # Software Link : https://sourceforge.net/projects/healthmonitor/files/HealthMonitor%20Application/3.1%20Stable/HealthMonitor_3.1Stable.zip/download # Tested Version: 3.1 # Vulnerability Type: Unquoted Service Path # Tested on OS: Windows 10 # Vulnerability discovery: Registry value : HKLM\SYSTEM\ControlSet001\Services\HealthMonitor # Service info: C:\>sc qc HealthMonitor [SC] QueryServiceConfig SUCCESS SERVICE_NAME: HealthMonitor TYPE : 10 WIN32_OWN_PROCESS START_TYPE : 2 AUTO_START ERROR_CONTROL : 1 Normal BINARY_PATH_NAME : C:\Program Files (x86)\HealthMonitor\HealthMonitor.exe LOAD_ORDER_GROUP : TAG : 0 DISPLAY_NAME : HealthMonitor DEPENDENCIES : winmgmt : SysmonLog SERVICE_START_NAME : LocalSystem # Exploit: This vulnerability could permit executing code during startup or reboot with the escalated privileges.