Lucene search

K
cve[email protected]CVE-2024-31226
HistoryMay 16, 2024 - 7:15 p.m.

CVE-2024-31226

2024-05-1619:15:49
CWE-428
web.nvd.nist.gov
28
sunshine
moonlight
windows
file placement attack
acls
system locale
patch
workarounds
application control tools
windows defender application control
applocker
software restriction policies
permissions
directory access control

4.9 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H

5.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Sunshine is a self-hosted game stream host for Moonlight. Users who ran Sunshine versions 0.17.0 through 0.22.2 as a service on Windows may be impacted when terminating the service if an attacked placed a file named C:\Program.exe, C:\Program.bat, or C:\Program.cmd on the user’s computer. This attack vector isn’t exploitable unless the user has manually loosened ACLs on the system drive. If the user’s system locale is not English, then the name of the executable will likely vary. Version 0.23.0 contains a patch for the issue. Some workarounds are available. One may identify and block potentially malicious software executed path interception by using application control tools, like Windows Defender Application Control, AppLocker, or Software Restriction Policies where appropriate. Alternatively, ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory C:. Require that all executables be placed in write-protected directories.

Affected configurations

Vulners
Node
lizardbytesunshineRange0.17.00.23.0

CNA Affected

[
  {
    "vendor": "LizardByte",
    "product": "Sunshine",
    "versions": [
      {
        "version": ">= 0.17.0, < 0.23.0",
        "status": "affected"
      }
    ]
  }
]

4.9 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H

5.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Related for CVE-2024-31226