Depending on the intended action being performed, this could allow an attacker to cause the product to read, write, delete, or otherwise operate on unauthorized files.
In Windows, NTFS5 allows for file system objects called reparse points. Applications can create a hard link from one directory to another directory, called a junction point. They can also create a mapping from a directory to a drive letter, called a mount point. If a file is used by a privileged program, but it can be replaced with a hard link to a sensitive file (e.g., AUTOEXEC.BAT), an attacker could excalate privileges. When the process opens the file, the attacker can assume the privileges of that process, tricking the privileged process to read, modify, or delete the sensitive file, preventing the program from accurately processing data. Note that one can also point to registries and semaphores.
Portée | Impact | Probabilité |
---|---|---|
Confidentiality | Read Files or Directories Note: Read arbitrary files by replacing a user-controlled folder with a mount point and additional hard links. | |
Integrity | Modify Files or Directories Note: Modify an arbitrary file by replacing the rollback files in installer directories, as they can have the installer execute those rollbacks. | |
Availability | Modify Files or Directories Note: Even if there is no control of contents, an arbitrary file delete or overwrite (when running as SYSTEM or admin) can be used for a permanent system denial-of-service, e.g. by deleting a startup configuration file that prevents the service from starting. |
Références | Description |
---|---|
CVE-2021-26426 | Privileged service allows attackers to delete unauthorized files using a directory junction, leading to arbitrary code execution as SYSTEM. |
CVE-2020-0863 | By creating a mount point and hard links, an attacker can abuse a service to allow users arbitrary file read permissions. |
CVE-2019-1161 | Chain: race condition (CWE-362) in anti-malware product allows deletion of files by creating a junction (CWE-1386) and using hard links during the time window in which a temporary file is created and deleted. |
CVE-2014-0568 | Escape from sandbox for document reader by using a mountpoint [REF-1264] |
Nom | Organisation | Date | Date de publication | Version |
---|---|---|---|---|
CWE Content Team | MITRE | 4.8 |
Nom | Organisation | Date | Commentaire |
---|---|---|---|
CWE Content Team | MITRE | updated Description, Potential_Mitigations | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes |