{"id":16665,"date":"2021-07-07T15:51:07","date_gmt":"2021-07-07T13:51:07","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-advisories\/usd-2020-0006\/"},"modified":"2021-07-19T14:14:40","modified_gmt":"2021-07-19T12:14:40","slug":"usd-2020-0006","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2020-0006\/","title":{"rendered":"usd-2020-0006"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\"]<\/p>\n<h1>usd-2020-0006 | STARFACE UCC Client v6.7.0.180<\/h1>\n<p><span><\/span><br \/><strong>Advisory ID<\/strong><span>: usd-2020-0006<\/span><br \/><strong>CVE Number<\/strong><span>: CVE-2020-10515<\/span><br \/><strong>Affected Product<\/strong><span>: STARFACE UCC Client<\/span><br \/><strong>Affected Version<\/strong><span>: v6.7.0.180<\/span><br \/><strong>Vulnerability Type<\/strong><span>: Binary Planting<\/span><br \/><strong>Security Risk<\/strong><span>: High<\/span><br \/><strong>Vendor URL<\/strong><span>: <a href=\"https:\/\/www.starface.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.starface.com\/<\/a><\/span><br \/><strong>Vendor Status<\/strong><span>: Fixed in v6.7.1.204<\/span><\/p>\n<h3><\/h3>\n<h3>Description<\/h3>\n<p>Binary planting is a general term for an attack where the attacker places (i.e., plants) a binary file containing malicious code to a local or remote file system in order to trick a vulnerable application to load and execute it.<\/p>\n<p>The service <em>StarfaceUccApiRegistryService<\/em> registered in the application STARFACE UCC Client is prone to binary planting. This means, an unprivileged user can manipulate the service, which runs as administrator. In consequence, every user can execute software with administrative privileges.<\/p>\n<p><span><\/span><\/p>\n<h3>Proof of Concept (PoC)<\/h3>\n<p>The registered service <em>StarfaceUccApiRegistryService<\/em> in the process <em>UccApiRegistryService.exe<\/em> is started as <em>LocalSystem<\/em>. At the same time, the group \u201eeveryone\u201c and the group \u201einteractive\u201c users can configure the service. In consequence, all users can execute software with administrative privileges.<\/p>\n<p>The security descriptor written in the Security Descriptor Definition Language (SDDL) means:<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=\"x-code\" _builder_version=\"4.9.4\" _module_preset=\"9e260d37-0be2-4a12-a10e-3ed7e27b6ac6\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<p>Prefix of S: System Access Control List (SACL)<br \/>Prefix of D: Discretionary ACL (DACL)<\/p>\n<p>D:(A;;CCLCRPWPDTLOCRSDRCWDWO;;;IU) - Alias IU (Interactively logged-on user) has WD (Modify permissions)<br \/>S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD) - Alias WD (Everyone) has WD (Modify permissions)<\/p>\n<p>C:\\Program Files (x86)\\Windows Resource Kits\\Tools&amp;gt;sc qc StarfaceUccApiRegistryService<br \/>[SC] QueryServiceConfig ERFOLG<\/p>\n<p>SERVICE_NAME: StarfaceUccApiRegistryService<br \/>TYPE : 110 WIN32_OWN_PROCESS (interactive)<br \/>START_TYPE : 2 AUTO_START<br \/>ERROR_CONTROL : 1 NORMAL<br \/>BINARY_PATH_NAME : C:\\Program Files\\STARFACE\\UC Client\\UccApiRegistryService.exe<br \/>LOAD_ORDER_GROUP :<br \/>TAG : 0<br \/>DISPLAY_NAME : STARFACE TAPI Support Service<br \/>DEPENDENCIES :<br \/>SERVICE_START_NAME : LocalSystem<\/p>\n<p>C:\\Program Files (x86)\\Windows Resource Kits\\Tools&amp;gt;sc sdshow StarfaceUccApiRegistryService<\/p>\n<p>D:(A;;CCLCRPWPDTLOCRSDRCWDWO;;;IU)(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\"]<\/p>\n<p><span>The vulnerability is demonstrated by adding a new local administrator. In order to do this, the <\/span><em>binpath<\/em><span> of the service is manipulated. Then, the service is restarted.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd-security-advisories-usd-2020-0006-1.jpg\" title_text=\"usd-security-advisories-usd-2020-0006-1\" _builder_version=\"4.9.4\" _module_preset=\"default\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\"]<\/p>\n<div class=\"e16902-22 x-container max width\">\n<div class=\"e16902-23 x-column x-sm x-1-1\">\n<h3>Fix<\/h3>\n<p><span>The service permissions should be restricted so that only administrators can configure the service. If possible, the service should run without administrator privileges.<\/span><\/p>\n<h3><\/h3>\n<h3>References<\/h3>\n<p><a href=\"https:\/\/owasp.org\/www-community\/attacks\/Binary_planting\" target=\"_blank\" rel=\"noopener\">https:\/\/owasp.org\/www-community\/attacks\/Binary_planting<\/a><\/p>\n<h3><\/h3>\n<h3>Timeline<\/h3>\n<ul>\n<li>2020-01-29 First contact request via contact form at <a href=\"https:\/\/www.starface.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.starface.com\/en\/contact\/<\/a><\/li>\n<li>2020-02-06 Submission of this advisory<\/li>\n<li>2020-03-11 Vendor schedules update<\/li>\n<li>2020-03-26 Update is published: <a href=\"https:\/\/support.starface.de\/forum\/showthread.php?7916-UCC-Client-f%FCr-Windows-Version-6-7-1-204-Released-26-03-2020&amp;p=47548\" target=\"_blank\" rel=\"noopener\">https:\/\/support.starface.de\/forum\/showthread.php?7916-UCC-Client-f%FCr-Windows-Version-6-7-1-204-Released-26-03-2020&amp;p=47548<\/a><\/li>\n<li><span>2020-04-29 Security advisory released<\/span><\/li>\n<\/ul>\n<h3><\/h3>\n<h3>Credits<\/h3>\n<p><span>This security vulnerabilities were found by Tobias Neitzel and Niklas Bessler of usd AG.<\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2020-0006 | STARFACE UCC Client v6.7.0.180 Advisory ID: usd-2020-0006CVE Number: CVE-2020-10515Affected Product: STARFACE UCC ClientAffected Version: v6.7.0.180Vulnerability Type: Binary PlantingSecurity Risk: HighVendor URL: https:\/\/www.starface.com\/Vendor Status: Fixed in v6.7.1.204 Description Binary planting is a general term for an attack where the attacker places (i.e., plants) a binary file containing malicious code to a local or remote [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16665","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16665"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16665\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}