|
Exploiting WebView through Internet Explorer to remotely discover windows directory |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Exploiting WebView through Internet Explorer to remotely discover windows directory Par EvilFingersLe [2009-12-04] à 13:06:38
Présentation : As for any large product, Microsoft Windows operating system is built on its previous versions code. Some of this code even goes back until Microsoft Windows 98. In Windows 98 a new look was introduced called WebView which included the way folders are displayed and the way the desktop is displayed are all HTML templates which were also editable to the default administrative user.You can read more about it here http msdn.microsoft.com en-s library bb776835 VS.85 .aspx Those HTML Templates had the extension htt . In order for the folder templates to function properly and being able to display the current folder, a few automatically expended variables were added to the module filtering the htt files. These are pourcentsTEMPLATEDIRpourcents hardcoded pourcentsTHISDIRPATHpourcents hardcoded pourcentsTHISDIRNAMEpourcents hardcoded pourcentsBACKGROUNDpourcents registry pourcentsLOGOLINEpourcents registry This mechanism lives until today deeply inside Windows XP's code in two modules inside the system32 folder 1 Webvw.dll 2 Mshtml.dll Webvw.dll is the module which is responsible for all the Webview installation and normal activity and mshtml.dll is the main module for HTML Filtering Rendering used Windows Explorer and Internet Explorer. When Microsoft Windows is installed and webvw.dll is registered, it adds it CLSID and a few registry keys. The interesting ones are these HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Explorer WebView TemplateMacros HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Explorer WebView TemplateMacros BACKGROUND Default pourcentsSystemRootpourcents Web wvleft.bmp HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Explorer WebView TemplateMacros LOGOLINE Default pourcentsSystemRootpourcents Web wvline.gif Every time an htt file is rendered, without any local-remote or any zone consideration, those variables are replaced with the current system's path. This is the code inside mimeflt.cpp which contains the bug Lines 360 to 433 define REG_WEBVIEW_TEMPLATE_MACROS TEXT Software Microsoft Windows CurrentVersion Explorer WebView TemplateMacros void ConvertBytesToTChar LPCBYTE pBuf, UINT nCharSize, LPTSTR psz, int cch if SIZEOF char nCharSize SHAnsiToTChar LPCSTR pBuf, psz, cch else ASSERT nCharSize SIZEOF WCHAR SHUnicodeToTChar LPCWSTR pBuf, psz, cch void ExpandMacro LPBYTE pszMacro, LPBYTE pszExpansion, int nBytes, UINT nCharSize TCHAR szExpansion MAX_PATH szExpansion 0 TEXT ' 0' TCHAR szTCharMacro MAX_PATH ConvertBytesToTChar pszMacro, nCharSize, szTCharMacro, ARRAYSIZE szTCharMacro TCHAR szKey MAX_PATH lstrcpyn szKey, REG_WEBVIEW_TEMPLATE_MACROS, ARRAYSIZE szKey StrCatBuff szKey, TEXT , ARRAYSIZE szKey StrCatBuff szKey, szTCharMacro, ARRAYSIZE szKey HKEY hkMacros if RegOpenKey HKEY_CURRENT_USER, szKey, hkMacros ERROR_SUCCESS RegOpenKey HKEY_LOCAL_MACHINE, szKey, hkMacros ERROR_SUCCESS DWORD dwType DWORD cbData SIZEOF szExpansion SHQueryValueEx hkMacros, NULL, NULL, dwType, LPBYTE szExpansion, RegCloseKey hkMacros ConvertTCharToBytes szExpansion, nCharSize, pszExpansion, nBytes int CWebViewMimeFilter Expand LPBYTE pszVar, LPBYTE ppszExp if StrCmp pszVar, TEMPLATEDIR , L TEMPLATEDIR if szTemplateDirPath 0 GetMachineTemplateDir szTemplateDirPath, SIZEOF szTemplateDirPath , _nCharSize ppszExp _szTemplateDirPath else if StrCmp pszVar, THISDIRPATH , L THISDIRPATH if szThisDirPath 0 _QueryForDVCMDID DVCMDID_GETTHISDIRPATH, _szThisDirPath, SIZEOF szThisDirPath ppszExp _szThisDirPath else if StrCmp pszVar, THISDIRNAME , L THISDIRNAME if szThisDirName 0 _QueryForDVCMDID DVCMDID_GETTHISDIRNAME, _szThisDirName, SIZEOF szThisDirName ppszExp _szThisDirName else ExpandMacro pszVar, _szExpansion, SIZEOF szExpansion , _nCharSize ppszExp _szExpansion return _StrLen ppszExp In Windows XP the variables pourcentsTHISDIRPATHpourcents and pourcentsTHISDIRNAMEpourcents were removed from the Mime Filter which means pourcentsTEMPLATEDIRpourcents, pourcentsBACKGROUNDpourcents and pourcentsLOGOLINEpourcents would still be translated into the current windows directory. The Proof Of Concept code Remote WebView Macro Translation Save on a remote host with an htt extension and replace http filter_trap.htt --------------------------- filter_trap.htt start -------------------------------- div id BACKGROUND pourcentsBACKGROUNDpourcents div div id LOGOLINE pourcentsLOGOLINEpourcents div div id TEMPLATEDIR pourcentsTEMPLATEDIRpourcents div script alert document.getElementById BACKGROUND .innerHTML alert document.getElementById LOGOLINE .innerHTML alert document.getElementById TEMPLATEDIR .innerHTML script --------------------------- filter_trap.htt end --------------------------------
Les mots clés de la revue de presse pour cet article : internet windows Les videos sur SecuObs pour les mots clés : internet windows Les mots clés pour les articles publiés sur SecuObs : internet windows Les éléments de la revue Twitter pour les mots clé : internet windows
Les derniers articles du site "EvilFingers" :
- EFBlog Moved Permanently - Crimeware in 2009 - Anti-Virus Live 2010. Talking with the enemy - RussKill. Application to perform denial of service attacks - Bypassing Windows Unknown Publisher Verification For Web Downloaded Executables - Fusion. A concept adopted by the current crimeware II - Disinformation campaign to spread malware - A brief glance inside Fragus - Exploiting WebView through Internet Explorer to remotely discover windows directory - Koobface campaign spread through Blogspot
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.191.75.173 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.191.75.173 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|