Are you guys seriously reporting that double clicking on a malicious .vbs
file could lead to remote code execution? :P

Either I'm missing something (and I'd welcome a rebuttal here!) or you might
as well add .exe to that list. All those extensions are already executable.

On Fri, Sep 2, 2011 at 7:35 PM, CYBSEC Labs <cybsecl...@cybsec.com> wrote:

> **
> Advisory Name: Windows Script Host DLL Hijacking
>
> Internal Cybsec Advisory Id:
> 2011-0901-Windows Script Host DLL Hijacking
>
> Vulnerability Class:
> Remote Command Execution Vulnerability
>
> Release Date:
> September 2, 2011
>
> Affected Applications:
> Windows Script Host v5.6; other versions may also be affected
>
> Affected Platforms:
> Any running Windows Script Host v5.6
>
> Local / Remote:
> Remote / Local
>
> Severity:
> High – CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
>
> Researcher:
> Juan Manuel Garcia
>
> Vendor Status:
> Acknowedged
>
> Reference to Vulnerability Disclosure Policy
> : http://www.cybsec.com/vulnerability_policy.pdf
>
> Vulnerability Description:
>
> DLL Hijacking takes advantage of the way an application dynamically
>
> loads dll libraries without specifying a fully qualified path. This is
>
> usually done invoking the LoadLibrary and LoadLibraryEx functions to
>
> dynamically load DLLs.
>
> In order to exploit this vulnerability a user must open a file with an
>
> extension associated to the vulnerable application. A malicious dll,
>
> named exactly as a dll the apllications loads using the vulnerable
>
> function, must be placed in the same directory as the opened file.
>
> The application will then load the malicious dll instead of the
>
> original, thus executing the malicious code.
>
> The following application loads external libraries following an
> insufficiently qualified path.
>
> Application: wscript.exe
>
> Extensions: js, jse, vbe, vbs, wsf, wsh
>
> Library: wshesn.dll
>
> Exploit:
>
> Option 1 - Using the “msfpayload” Metasploit module as shown below:
>
> msfpayload windows/exec CMD=calc.exe D > exploit.dll
>
> Option 2 - Using the “webdav_dll_hijacker” Metasploit module.
>
> Impact:
>
> A successful exploit of this vulnerability leads to arbitrary code
> execution.
>
> Vendor Response:
>
> 2011/08/09 – Vulnerability was identified.
>
> 2011/08/19 – Cybsec sent detailed information on the issue and a Proof of
> Concept.
>
> 2011/08/19 – Vendor stated: “As a matter of policy, we cannot comment on
> ongoing investigations”.
>
> 2011/08/19 – Vendor was informed that the security advisory would be
> published after 15 days.
>
> 2011/09/02 – Vulnerability was released.
>
> Contact Information:
>
> For more information regarding the vulnerability feel free to contact the
> researcher at
>
> jmgarcia <at> cybsec <dot> com
>
> About CYBSEC S.A. Security Systems
>
> Since 1996,
> CYBSEC is engaged exclusively in rendering professional services
> specialized in
>
> Information Security. Their area of services covers Latin America, Spain
> and over 250 customers are a
>
> proof of their professional life.
>
> To keep objectivity, CYBSEC S.A. does not represent, neither sell, nor is
> associated with other
>
> software and/or hardware provider companies.
>
> Our services are strictly focused on Information Security, protecting our
> clients from emerging security
>
> threats, maintaining their IT deployments available, safe, and reliable.
>
> Beyond professional services, CYBSEC is continuously researching new
> defense and attack techniques
>
> and contributing with the security community with high quality information
> exchange.
>
> For more information, please visit www.cybsec.com
>
> (c) 2011 - CYBSEC S.A. Security Systems
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 
“There's a reason we separate military and the police: one fights the enemy
of the state, the other serves and protects the people. When the military
becomes both, then the enemies of the state tend to become the people.”
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to