Giter Club home page Giter Club logo

awesome-vulnerabilities's Introduction

Awesome Vulnerabilities

Collection of awesome and fascinating vulnerabilities. From sneaky persistence, to time of check to time of use vulnerabilities, to vulnerabilities where a awesome combination of multiple factors leades to privilege escalation.

Time of Check to Time of Use (TOCTOU)

  • psychicpaper - I dubbed it “psychic paper” because, just like the item by that name that Doctor Who likes to carry, it allows you get past security checks and make others believe you have a wide range of credentials that you shouldn’t have.. Exploiting the difference of the XML parsers in iOS and macOS allowed having more permissions than allowed by using comment tags inside the permission manifest (called Entitlement in Apple terms). So simple, in fact, that the PoC I tweeted out looks like an absolute joke. But it’s 100% real.
  • Firejail LPE - Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation. See advisory fore additional information.
  • Flatpak app permission issue - Flatpak app permissions issue, permissions at install time vs. runtime and possible malicious local filesystem write. CVE IDs CVE-2021-43860 and CVE-2022-21682. Several vulnerabilities were discovered in Flatpak, an application deployment framework for desktop apps. CVE-2021-43860: Ryan Gonzalez discovered that Flatpak didn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime. Malicious apps could therefore grant themselves permissions without the consent of the user. CVE-2022-21682: Flatpak didn't always prevent a malicious flatpak-builder user from writing to the local filesystem.

Privilege Escalation / Privileged Writes

  • CVE-2015-0057: One-Bit To Rule Them All: Bypassing Windows’ 10 Protections using a Single Bit - The local privilege escalation vulnerability (CVE-2015-0057) could give attackers total control of the victims' machines. The flaw existed in the graphical user interface (GUI) component of the Win32k.sys module within the Windows Kernel which, among other things, manages vertical and horizontal Windows' scroll bars. The flaw actually resides in the xxxEnableWndSBArrows function which could alter the state of both scroll bars through a call.
  • CVE-2019-13382: Local Privilege Escalation in SnagIt - Awesome combination of high-privilege service and user-writable directories. When the [TechSmith Uploader Service] checks for [invalid] presentations, it will move the file out of the QueuedPresentations folder and into the InvalidPresentations folder. When it does so, the service will hit the symbolic link and write the new file into a protected location with permissions that allow the low privileged user full control over the contents, resulting in Elevation of Privilege to NT AUTHORITY\SYSTEM.
  • PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) - Using one PowerShell command leads to persistence and priviledge escalation. In the words of the author of the blog post: This bug is so simple that it’s almost embarrassing once you realize all it would’ve taken is a PowerShell command..
  • Exploiting (Almost) Every Antivirus Software - RACK911 Labs has come up with a unique but simple method of using directory junctions (Windows) and symlinks (macOS & Linux) to turn almost every antivirus software into self-destructive tools. When an unknown file is saved to the hard drive, the antivirus software will usually perform a “real time scan” either instantly or within a couple of minutes. If the unknown file is determined to be a suspected threat, the file will then be automatically quarantined and moved to a secure location pending further user instructions or it will simply be deleted. What most antivirus software fail to take into consideration is the small window of time between the initial file scan that detects the malicious file and the cleanup operation that takes place immediately after. A malicious local user or malware author is often able to perform a race condition via a directory junction (Windows) or a symlink (Linux & macOS) that leverages the privileged file operations to disable the antivirus software or interfere with the operating system to render it useless, etc.
  • Faxing Your Way to SYSTEM - DLL side loading leads to priviledge escalation when using fax service (and the DLL for the spooler).

awesome-vulnerabilities's People

Contributors

karneades avatar

Stargazers

 avatar  avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.