{"id":16691,"date":"2021-07-07T16:29:30","date_gmt":"2021-07-07T14:29:30","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-advisories\/usd-2020-0038\/"},"modified":"2021-07-19T14:16:07","modified_gmt":"2021-07-19T12:16:07","slug":"usd-2020-0038","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2020-0038\/","title":{"rendered":"usd-2020-0038"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<h1 class=\"h-custom-headline usd-small-letters h2\"><span>usd-2020-0038 | NCP Secure Enterprise Windows Client 10.14<\/span><\/h1>\n<p><span><\/span><\/p>\n<p><span><\/span><strong>Advisory ID<\/strong><span>: usd-2020-0038<\/span><br \/><strong>CVE Number<\/strong><span>: CVE-2020-11474<\/span><br \/><strong>Affected Product<\/strong><span>: NCP Secure Enterprise Windows Client\u00a0<\/span><br \/><strong>Affected Version<\/strong><span>: 10.14<\/span><br \/><strong>Vulnerability Type<\/strong><span>: Privileged File Write<\/span><br \/><strong>Security Risk<\/strong><span>: Critical<\/span><br \/><strong>Vendor URL<\/strong><span>: <a href=\"https:\/\/www.ncp-e.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ncp-e.com<\/a><\/span><br \/><strong>Vendor Status<\/strong><span>: Fixed in 10.15 r47589<\/span><\/p>\n<h3><\/h3>\n<h3>Description<\/h3>\n<p><span>Symbolic link attacks have become more and more popular on Windows operating systems. A symbolic link is just a directory entry that points to a different location of the file system and redirects certain file operations to the actual target. When privileged processes interact with user controlled parts of the file system, symbolic links can be used to redirect privileged file operations in order to achieve an elevation of privileges. However, it should be noticed that low privileged user accounts are not able to create symbolic links that connect two ordinary file system locations. That being said, there is a workaround that allows the creation of pseudo symbolic links, as demonstrated by<\/span><a href=\"https:\/\/vimeo.com\/showcase\/3416096\/video\/133002251\" target=\"_blank\" rel=\"noopener\"> James Forshaw<\/a><span>.<\/span><\/p>\n<p><span><\/span><\/p>\n<h3>Proof of Concept (PoC)<\/h3>\n<p><span>The NCP Secure Enterprise client allows low privileged user accounts to issue an operation with name <\/span><em>Support Assistent<\/em><span>. When this operation is used, several files get written to a user controlled path of the file system and some of these files are written with administrative privileges. In the following only the <\/span><em>Mobile Network Support<\/em><span>\u00a0flag is used during the export, which only generates a single file:<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200038-1.png\" title_text=\"usd20200038-1\" _builder_version=\"4.9.4\" _module_preset=\"default\" custom_margin=\"27px||43px||false|false\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"default\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<p><span>Since the directory is user controlled, the low privileged user can create a symbolic link to another location of the file system. After the <\/span><em>Support Assistent<\/em><span>\u00a0function is used again, the targeted file gets written with administrative privileges.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200038-2.png\" title_text=\"usd20200038-2\" _builder_version=\"4.9.4\" _module_preset=\"default\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<div class=\"e16902-22 x-container max width\">\n<div class=\"e16902-23 x-column x-sm x-1-1\">\n<p><span>Apart from Denial of Service attacks, attackers could use this vulnerability for local privilege escalations, since parts of the file contents are user controlled.<\/span><\/p>\n<h3><\/h3>\n<h3>Fix<\/h3>\n<p><span>Privileged file operations on user controlled parts of the file system should be treated with special care. If possible, privileged file writes should only target protected locations on the file system. Moreover, the privileged process itself can implement different mitigations like impersonation or inspecting targeted files for filesystem links.<\/span><\/p>\n<h3><\/h3>\n<h3>References<\/h3>\n<ul>\n<li><a href=\"https:\/\/vimeo.com\/showcase\/3416096\/video\/133002251\" target=\"_blank\" rel=\"noopener\">https:\/\/vimeo.com\/showcase\/3416096\/video\/133002251<\/a><\/li>\n<li><a href=\"https:\/\/googleprojectzero.blogspot.com\/2015\/12\/between-rock-and-hard-link.html\" target=\"_blank\" rel=\"noopener\">https:\/\/googleprojectzero.blogspot.com\/2015\/12\/between-rock-and-hard-link.html<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Timeline<\/h3>\n<ul>\n<li>2020-03-31 This vulnerability was found by Tobias Neitzel during a pentest<\/li>\n<li>2020-04-01 Initial contact request via info-mv@ncp-e.com<\/li>\n<li>2020-04-03 Submit Advisory to vendor<\/li>\n<li>2020-05-28 vendor publishes fix in <strong>NCP Secure Enterprise Client 10.15 r47589<\/strong><\/li>\n<li>2020-06-18\u00a0Security advisory released<\/li>\n<\/ul>\n<h3><\/h3>\n<h3>Credits<\/h3>\n<p><span>This security vulnerability was found by Tobias Neitzel of usd AG<\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2020-0038 | NCP Secure Enterprise Windows Client 10.14 Advisory ID: usd-2020-0038CVE Number: CVE-2020-11474Affected Product: NCP Secure Enterprise Windows Client\u00a0Affected Version: 10.14Vulnerability Type: Privileged File WriteSecurity Risk: CriticalVendor URL: https:\/\/www.ncp-e.comVendor Status: Fixed in 10.15 r47589 Description Symbolic link attacks have become more and more popular on Windows operating systems. A symbolic link is just a directory [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16691","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16691"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16691\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}