Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-31226
HistoryMay 16, 2024 - 6:12 p.m.

CVE-2024-31226 Sunshine's unquoted executable path could lead to hijacked execution flow

2024-05-1618:12:57
CWE-428
GitHub_M
github.com
4
sunshine
unquoted executable path
hijacked execution flow
cve-2024-31226
windows service
acls
system locale
patch
application control
denial of write access

CVSS3

4.9

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H

AI Score

5.2

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Sunshine is a self-hosted game stream host for Moonlight. Users who ran Sunshine versions 0.17.0 through 0.22.2 as a service on Windows may be impacted when terminating the service if an attacked placed a file named C:\Program.exe, C:\Program.bat, or C:\Program.cmd on the user’s computer. This attack vector isn’t exploitable unless the user has manually loosened ACLs on the system drive. If the user’s system locale is not English, then the name of the executable will likely vary. Version 0.23.0 contains a patch for the issue. Some workarounds are available. One may identify and block potentially malicious software executed path interception by using application control tools, like Windows Defender Application Control, AppLocker, or Software Restriction Policies where appropriate. Alternatively, ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory C:. Require that all executables be placed in write-protected directories.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:lizardbyte:sunshine:*:*:*:*:*:*:*:*"
    ],
    "vendor": "lizardbyte",
    "product": "sunshine",
    "versions": [
      {
        "status": "affected",
        "version": "0.17",
        "lessThan": "0.23",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

4.9

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H

AI Score

5.2

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-31226