Penetration Testing mailing list archives

Re: Microsoft RDP Priv. Escalation


From: "Mark Owen" <mr.markowen () gmail com>
Date: Sun, 6 Apr 2008 20:29:50 -0500

On Fri, Apr 4, 2008 at 8:56 PM,  <Yousif () vapt-sec com> wrote:
A friend of mine and I found a certain vulnerability within the RDP allowing for further escalation to administrative 
access. Check it out here: http://yousifyalda.blogspot.com/2008/04/microsoft-rdp-priv-escalation.html


Just to clarify, this isn't so much of a RDP exploit, though it is the
medium, but a policy bug for the command prompt.  Disabling the
command prompt does not prevent application execution through the /C
parameter.  I've confirmed that replacing the default shell with a /C
cmd prompt will execute an application, but only within the rights of
the user signing in.

Change the
alternate shell:s:cmd.exe /C dir /s /l /b C:\*.* && pause
to
alternate shell:s:cmd.exe /C echo %USERNAME% && pause
for verification of the user that the application is running as.


-- 
Mark Owen

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


Current thread: