exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Windows Attachment Manager Incorrect High Risk JAR Handling

Windows Attachment Manager Incorrect High Risk JAR Handling
Posted Oct 27, 2017
Authored by Stevie Lamb

The Windows Attachment Manager does not correctly handle JAR files marked as high risk when accessed via Internet Explorer 11.

tags | advisory
systems | windows
SHA-256 | 55d6f4555285c911f938d1c94208c74030f6f4131f6a8f5b3412527ade760885

Windows Attachment Manager Incorrect High Risk JAR Handling

Change Mirror Download
Scenario:

The Windows Attachment Manager does not correctly handle JAR files marked as
"high risk" when accessed via Internet Explorer 11.

This leads to direct execution of any JAR file when a user clicks "Open"
rather than "Save" or "Save as", when the expected behaviour would be a nag
dialog.



Other files added to the same "high risk" category behave as expected,
regardless of whether they are directly launched or first saved.

Currently neither Chrome, Edge nor Firefox browsers provide an "Open" option
for such files, and so are unaffected.



With some social engineering this behaviour may be exploited to gain code
execution at the privilege level of the affected user.

This is most likely to be successful when the user has been conditioned to
expect warnings from the Attachment Manager about potentially unsafe files.



MS Security decided this wasn't a security issue and by their published
definitions I accept that assertion.

But sharing's caring, this issue can and therefore probably will be abused,
if it hasn't already.



To reproduce:



Client OS : Windows 10 Pro (version 10.0.14393)

Browser : IE11 (version 11.00.14393.0) *supplied with OS for backwards
compatibility



Sample Attachment Manager configuration


Setting

State

Attribute : Value


Trust logic for file attachments

Enabled

Determine risk by : Preferring the file handler


Default risk level for file attachments

Enabled

Set the default risk level : High risk


Inclusion list for high-risk file types

Enabled

.com;.bat;.exe;.pif;.scr;.msi;.ps1;.jar;.sh;.py;.Zip;.Rar;.7z;.gz;.tar;.vbs;
.js;.wsf


Inclusion list for low file types

Enabled



Inclusion list for moderate risk file types

Enabled

.doc;.xlsx;.docx;



1. Download any JAR file using the built-in IE11 (x64 or x86) and opt
to open it.

2. The file opens without any nag dialog indicating the file type is
potentially harmful.



Hope it's useful.

Kind regards,
Stevie

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close