From: Mark Owen (mr.markowen@gmail.com)
Date: Sun Apr 06 2008 - 21:29:50 EDT
On Fri, Apr 4, 2008 at 8:56 PM, <Yousif@vapt-sec.com> wrote:
> A friend of mine and I found a certain vulnerability within the RDP allowing for further escalation to administrative access. Check it out here: http://yousifyalda.blogspot.com/2008/04/microsoft-rdp-priv-escalation.html
>
Just to clarify, this isn't so much of a RDP exploit, though it is the
medium, but a policy bug for the command prompt. Disabling the
command prompt does not prevent application execution through the /C
parameter. I've confirmed that replacing the default shell with a /C
cmd prompt will execute an application, but only within the rights of
the user signing in.
Change the
alternate shell:s:cmd.exe /C dir /s /l /b C:\*.* && pause
to
alternate shell:s:cmd.exe /C echo %USERNAME% && pause
for verification of the user that the application is running as.
-- Mark Owen ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------ -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:30 EDT