-
Notifications
You must be signed in to change notification settings - Fork 59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security Vulnerability in Munin-node-win32 Service. #78
Comments
Thank you for reporting this issue! I am not using munin-node-win32, thus I have some questions:
Is the kind of "execution guessing" that you described (conditional tokenizing based on the existence of files) really Windows' documented behavior of that service definition field? That sounds like an embarrassingly awful concept ... |
I tested on an executable https://github.com/downloads/munin-monitoring/munin-node-win32/munin-node-win32-1.6.1.0-custom_perfmon-installer.exe It says version 1.6.1.0 (uploaded on 2012). I am not sure why it says version 1.6.0 (Beta) after installation. If there is any recent executable then please give me a downloadable link, I will run the same checks on it. The unprivileged user includes both People and Service Users. I have updated the above-linked document for more clarity. 'Service User' accounts usually have permissions to create a file in 'C' directory. This could allow a malicious user with local access to execute code with administrative privileges. Regarding 'execution guessing' Windows behavior, I am not sure whether this is documented by Microsoft or not. But Windows takes BINARY_PATH_NAME as it is and processes it. This is one of the most common Privilege Escalation vulnerability found in the wild for Windows environment. (Which most of the developer's do not know). You can find more details on Unquoted Paths Local Privilege Escalation vulnerability here: https://attack.mitre.org/techniques/T1034/ (Read paragraph Titled 'Unquoted Paths') Whenever registering a service, developers need to specify Binary Path surrounded with double quotes by doing something like below: |
In this case I assume, that you used the most recent version.
Thank you for the clarification.
I understand, that such a behavior have been useful for providing a high level of backwards compatibility in the Windows environment. But unsurprisingly such non-deterministic command execution is a welcome source of abuse.
Thank you for the explanation! Thus I assume that the handling of (I do not maintain |
Please tell me if it is still an issue on the newest version.... |
Yes it is. Maybe it is useful to remove Run and UninstallRun sections from installer files. Workaround to fix this security issue
Please note that binPath may vary, adjust it according to your system. |
First of all, thanks for keeping this great open source monitoring tool alive.
I found one security vulnerability in Munin-node-win32 Service. Maybe you guys are aware of it, I am not sure, but I haven’t found relevant CVE related to this issue.
Please find this article explaining details of the vulnerability with steps (along with snapshots) to reproduce.
If this is known vulnerability and corresponding CVE is present then please let me know the CVE. I have reserved a CVE number for this vulnerability. In that case, I will close this CVE request.
If this is unknown issue to you then please confirm it. Once the issue is fixed, we can publish this CVE, or if you want, we can publish this before the fix.
The text was updated successfully, but these errors were encountered: