Lucene search

K
hackeroneTsedlmeyerH1:812969
HistoryMar 08, 2020 - 1:06 a.m.

curl: curl still vulnerable to SMB access smuggling via FILE URL on Windows

2020-03-0801:06:41
tsedlmeyer
hackerone.com
9

Summary:

The released fix for CVE-2019-15601, SMB access smuggling via FILE URL on Windows, leaves curl still vulnerable to SMB access smuggling via FILE URLs.

  • FILE URLs formatted as file:////smb_server/smb_share/file are not filtered.
  • FILE URLs which point to the global DOS name space, ??, and formatted as file:///%3f%3f/UNC/smb_server/smb_share/file_name or file:///%3f%3f/GLOBAL/UNC/smb_server/smb_share/file are not filtered.

Steps To Reproduce:

  1. curl file:////localhost/c$/windows/win.ini
  2. curl file:///%3f%3f/UNC/localhost/c$/windows/win.ini
  3. curl file:///%3f%3f/GLOBAL/UNC/localhost/c$/windows/win.ini

The above examples will return the contents of C:\Windows\win.ini utilizing SMB to fetch the file via the local administrative share for the C drive. This will also work with remote shares.

Impact

A properly crafted URL could cause a user to unknowingly access a remote file.