lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 13 Oct 2015 10:57:04 +0200
From: <lists@...ossecurity.com>
To: "'Haifei Li'" <haifei-non-reply@...look.com>, <fulldisclosure@...lists.org>
Subject: Re: [FD] Watch your Downloads: the risk of the "auto-download"
	feature on Microsoft Edge and Google Chrome

Hi Haifei,

FYI, something similar was presented in 2012:

http://blog.acrossecurity.com/2012/02/downloads-folder-binary-planting.html

Thanks,
Mitja 

> -----Original Message-----
> From: Fulldisclosure [mailto:fulldisclosure-bounces@...lists.org] On
Behalf Of
> Haifei Li
> Sent: Saturday, October 03, 2015 1:43 AM
> To: fulldisclosure@...lists.org
> Subject: [FD] Watch your Downloads: the risk of the "auto-download"
feature
> on Microsoft Edge and Google Chrome
> 
> 
> 
> 
> 
> 
> 
> This is a copied version of my blog post, original version
> http://justhaifei1.blogspot.com/2015/10/watch-your-downloads-risk-of-
> auto.html.Probably it's commonly known that when you try to download
> something on your modern browser e.g. Google Chrome or Microsoft Edge, the
> file will be downloaded automatically to your local system with just a
simple
> clicking - no need for additional confirmations. With default settings,
the file will
> be downloaded to your "Downloads" folder
> ("C:\Users\<username>\Downloads").
> Personally, I have worried about this feature quite some times, now I
finally got
> some time on highlighting this. (Please tell me if there's someone already
talked
> about this, I quickly googled around and wasn't able to find an
appropriate one,
> I think it should be known by many ppl).
> 
> The "auto-download" feature is good from "user experience" perspective,
but
> obviously it's not good for security, as the downloading could also be
started by
> Javascript (<iframe src="url">). The attacker may just place a malicious
DLL with
> a specific name into the "Downloads" folder when the victim visits a
webpage
> he/she controls. In future, when the victim tries to download/install good
> programs (executables) from legitimate websites - of course, the good
> executable will be downloaded, and will be launched from the "Downloads"
> folder as well - then the installation/execution progress could be
hijacked.
> 
> This is because that in the real world, most executables replying dlls.
Anyway,
> the "application directory" is the very first place in the search order
when
> searching/loading for a dll (yoy may want to check this paper I released
years
> ago). So, probably, most of dlls even the system dlls could be hijacked
when you
> place a same-named dll in the executable's directory, and that's not for
the
> situation that the searching dll is not in anywhere of your system.
> 
> Usually, the "Downloads" folder is a place with massive downloaded files,
so the
> victim probably never get a change to realize there is a malicious DLL
sitting in
> his/her "Downloads" folder. I'd also doubt that even a normal user notices
a
> strange dll in his/her "Downloads" folder, does he/she will really delete
it
> immediately? DLLs won't be executed by themselves anyway, right?
> 
> Anyway, in the real world, for most people, who really check their
"Downloads"
> folder every time when they try to install something from internet?
Instead,
> most people just click the "Run" button directly when installing something
(see
> following figure).
> 
> 
> 
> 
> I have quickly made a video showing this risk. The test environment is
Windows
> 10 Pro, with Microsoft Edge and Google Chrome, fully updated as of Oct
2nd,
> 2015, all with default settings. Check it out here.
> 
> 
> As you may have noted, a modified "VERSION.DLL" will be dropped into the
> "Downloads" folder when visiting the webpage
> https://dl.dropboxusercontent.com/u/14747595/auto_download_test/test.html
> . Then, when the user tries to install Adobe Reader from the official
adobe.com
> website, the installation process of Adobe Reader will be hijacked - the
modified
> "VERSION.DLL" will be loaded and my shellcode will be executed.
> 
> There's one small thing, the code execution should be run out of the
browser
> sandbox, but unluckily the tested shellcode I copied from internet runs
calc.exe,
> and because there's no calc.exe anymore on Windows 10, what you've seen
it's
> just a Calculator App which runs within the App Container sandbox. Other
> shellcode, for example, running notepad.exe, will be run out of the App
> Container sandbox and give the attacker control of your system.
> #BringTheLovelyCalcBackMicrosoft!
> 
> Also note that with default setting, the Microsoft Edge will promote a
warning
> dialog saying the DLL is dangerous, offering the user an option to delete
the file.
> 
> 
> 
> 
> But:
> 1) Anyway, the DLL has been already dropped into the "Downloads" folder,
if the
> user chooses not to delete the file or just do nothing, future execution
will still
> be hijacked.2) I also guess this Microsoft Edge warning could be bypassed
if the
> DLL is a signed DLL, but I don't have a certificate to test.
> On Google Chrome, as you have seen, there's no warning at all.
> Thanks,Haifei
> 
> 
> 
> _______________________________________________
> Sent through the Full Disclosure mailing list
> https://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: http://seclists.org/fulldisclosure/


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ