Lucene search

K
osvGoogleOSV:GHSA-HGWP-4VP4-QMM2
HistoryMay 24, 2021 - 4:56 p.m.

Local Privilege Escalation in cloudflared

2021-05-2416:56:35
Google
osv.dev
9
cloudflared
privilege escalation
misconfiguration
windows
configuration file
access controls
security vulnerability

EPSS

0

Percentile

5.1%

In cloudflared versions < 2020.8.1 (corresponding to 0.0.0-20200820025921-9323844ea773 on pkg.go.dev) on Windows, if an administrator has started cloudflared and set it to read configuration files from a certain directory, an unprivileged user can exploit a misconfiguration in order to escalate privileges and execute system-level commands. The misconfiguration was due to the way that cloudflared reads its configuration file. One of the locations that cloudflared reads from (C:\etc) is not a secure by default directory due to the fact that Windows does not enforce access controls on this directory without further controls applied. A malformed config.yaml file can be written by any user. Upon reading this config, cloudflared would output an error message to a log file defined in the malformed config. The user-controlled log file location could be set to a specific location that Windows will execute when any user logs in.

EPSS

0

Percentile

5.1%

Related for OSV:GHSA-HGWP-4VP4-QMM2