Loading HuntDB...

Named pipe connection inteception

High
M
MariaDB
Submitted None

Vulnerability Details

Technical details and impact analysis

Business Logic Errors
With MariaDB running on Windows, when local clients connect to the server over named pipes, it's possible for an unprivileged user with an ability to run code on the server machine to intercept the named pipe connection and act as a man-in-the-middle, gaining access to all the data passed between the client and the server, and getting the ability to run arbitrary SQL commands on behalf of the connected user. On Windows, MariaDB allows local clients to connect to the server over named pipes. Unfortunately, when creating the named pipe server, the security descriptor is not set correctly, and as a result every user on the system can create pipe server instances. This allows for the following attack scenario: 1. The attacker creates a pipe server instance and waits for a client to connect to it. 2. Once a client is connected, the attacker connects to the real pipe server instance as a client. 3. At this point, the attacker is connected to the legitimate client and server, and can pass the messages back and forth, reading the messages (as they are passed in clear text) and possibly changing the messages. Please see the attached report and POC tool for more information. ## Impact - All the SQL requests/responses from the intercepted connection - Ability to run SQL commands

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Business Logic Errors