Re: Microsoft RDP Priv. Escalation

From: Mark Owen (mr.markowen@gmail.com)
Date: Sun Apr 06 2008 - 21:29:50 EDT


On Fri, Apr 4, 2008 at 8:56 PM, <Yousif@vapt-sec.com> wrote:
> A friend of mine and I found a certain vulnerability within the RDP allowing for further escalation to administrative access. Check it out here: http://yousifyalda.blogspot.com/2008/04/microsoft-rdp-priv-escalation.html
>

Just to clarify, this isn't so much of a RDP exploit, though it is the
medium, but a policy bug for the command prompt. Disabling the
command prompt does not prevent application execution through the /C
parameter. I've confirmed that replacing the default shell with a /C
cmd prompt will execute an application, but only within the rights of
the user signing in.

Change the
alternate shell:s:cmd.exe /C dir /s /l /b C:\*.* && pause
to
alternate shell:s:cmd.exe /C echo %USERNAME% && pause
for verification of the user that the application is running as.

-- 
Mark Owen
------------------------------------------------------------------------
This list is sponsored by: Cenzic
Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!
http://www.cenzic.com/downloads
------------------------------------------------------------------------
-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:30 EDT