CVE-2021-47762

7.8 HIGH

📋 TL;DR

HTTPDebuggerPro 9.11 has an unquoted service path vulnerability that allows local attackers to execute arbitrary code with SYSTEM privileges by placing malicious executables in the service path. This affects systems running HTTPDebuggerPro 9.11 on Windows where attackers have local access.

💻 Affected Systems

Products:
  • HTTPDebuggerPro
Versions: 9.11
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system and ability to write to directories in the service path.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege compromise allowing complete control of the affected system, installation of persistent backdoors, credential theft, and lateral movement.

🟠

Likely Case

Local privilege escalation to SYSTEM privileges enabling attackers to bypass security controls, install malware, or access sensitive system resources.

🟢

If Mitigated

Limited impact with proper access controls preventing local attackers from writing to vulnerable directories.

🌐 Internet-Facing: LOW - This requires local access to exploit, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Local attackers on the same system can exploit this to gain SYSTEM privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access and ability to write to vulnerable directories. Proof of concept available on Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.httpdebugger.com

Restart Required: No

Instructions:

No official patch available. Consider upgrading to newer versions if available or implementing workarounds.

🔧 Temporary Workarounds

Quote Service Path

windows

Modify the service configuration to use quoted paths for the binary executable.

sc config "HTTPDebuggerPro" binPath= "\"C:\Program Files\HTTPDebuggerPro\HTTPDebuggerPro.exe\""

Restrict Directory Permissions

windows

Set strict permissions on directories in the service path to prevent unauthorized writes.

icacls "C:\Program Files\HTTPDebuggerPro" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(W)"

🧯 If You Can't Patch

  • Remove HTTPDebuggerPro from production systems if not essential
  • Implement strict access controls to prevent local users from writing to vulnerable directories

🔍 How to Verify

Check if Vulnerable:

Check if HTTPDebuggerPro service path is unquoted: sc qc "HTTPDebuggerPro" | findstr BINARY_PATH_NAME

Check Version:

Check HTTPDebuggerPro version in Help > About or program properties

Verify Fix Applied:

Verify service path is quoted and directory permissions are restricted: sc qc "HTTPDebuggerPro" | findstr BINARY_PATH_NAME and icacls "C:\Program Files\HTTPDebuggerPro"

📡 Detection & Monitoring

Log Indicators:

  • Unusual service restarts
  • Creation of executables in HTTPDebuggerPro directories
  • Process creation from unusual locations

Network Indicators:

  • Outbound connections from SYSTEM processes not normally expected

SIEM Query:

Process Creation where (ImagePath contains "HTTPDebuggerPro" and CommandLine contains unusual paths) OR (Service Control Manager events for HTTPDebuggerPro service modification)

🔗 References

📤 Share & Export