$250 Bounty: Privilege Escalation in Acronis via System Clean-up Directory Junction Trick
文章描述了作者在Acronis True Image 2021中发现的本地权限提升漏洞。通过创建目录连接绕过符号链接保护机制,普通用户可删除受保护系统文件如hosts文件。该漏洞可能导致系统配置错误或破坏持久性机制。Acronis已修复该问题,并向作者支付了250美元赏金。 2025-6-30 07:47:18 Author: infosecwriteups.com(查看原文) 阅读量:33 收藏

How a Simple Symlink Bypass in Windows Temp Folder Let Me Delete Protected System Files Without Admin Rights

Monika sharma

In the never-ending battle for software security, even trusted utilities like system clean-up tools can become dangerous if they overlook subtle file system tricks. In this write-up, I’ll walk you through how I discovered a Local Privilege Escalation (LPE) vulnerability in Acronis True Image 2021, which earned me a $250 bounty.

Using Directory Junctions, I was able to delete sensitive system files like hosts from C:\\Windows\\System32\\drivers\\etc — all without administrative privileges.

Impact Summary:

An unprivileged user could leverage the System Clean-up feature to delete protected files and folders, leading to potential system misconfiguration or persistence mechanisms being destroyed.

The System Clean-up feature in Acronis True Image allows users to clean temporary files, browser data, history, and more. While symlink-based attacks were protected against, the tool was vulnerable to Directory Junction attacks.


文章来源: https://infosecwriteups.com/250-bounty-privilege-escalation-in-acronis-via-system-clean-up-directory-junction-trick-f8ab338a6744?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh