$250 Bounty: Privilege Escalation in Acronis via System Clean-up Directory Junction Trick
Windows临时文件夹中的符号链接绕过机制允许普通用户删除受保护系统文件,无需管理员权限。该漏洞存在于Acronis True Image 2021中,利用目录连接攻击实现。 2025-6-30 07:47:18 Author: infosecwriteups.com(查看原文) 阅读量:13 收藏

How a Simple Symlink Bypass in Windows Temp Folder Let Me Delete Protected System Files Without Admin Rights

Monika sharma

In the never-ending battle for software security, even trusted utilities like system clean-up tools can become dangerous if they overlook subtle file system tricks. In this write-up, I’ll walk you through how I discovered a Local Privilege Escalation (LPE) vulnerability in Acronis True Image 2021, which earned me a $250 bounty.

Using Directory Junctions, I was able to delete sensitive system files like hosts from C:\\Windows\\System32\\drivers\\etc — all without administrative privileges.

Impact Summary:

An unprivileged user could leverage the System Clean-up feature to delete protected files and folders, leading to potential system misconfiguration or persistence mechanisms being destroyed.

The System Clean-up feature in Acronis True Image allows users to clean temporary files, browser data, history, and more. While symlink-based attacks were protected against, the tool was vulnerable to Directory Junction attacks.


文章来源: https://infosecwriteups.com/250-bounty-privilege-escalation-in-acronis-via-system-clean-up-directory-junction-trick-f8ab338a6744?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh