`settingcontent-ms` files lacks "mark of the web" => execute code by dbl click in Downloads toolbar
Low
B
Brave Software
Submitted None
Actions:
Reported by
metnew
Vulnerability Details
Technical details and impact analysis
## Summary:
`settingcontent-ms` files allow launching any binary with any params.
Brave doesn't mark `settingcontent-ms` files with "mark of the web", so the file could be executed by double click in "Downloads" toolbar. Launched `settingcontent-ms` file could lead to code execution with user-level privileges.
## Products affected:
Brave: 0.23.19
Muon: 7.1.3
OS: 10.0.17134 (the image was downloaded today from the MS virtualbox images page)
Chromium: 67.0.3396
## Steps To Reproduce:
1. Download `twitter.settingcontent-ms` from attachments.
2. Dbl click on the item in "Downloads" toolbar.
3. Calculator opens (but as I said, it's possible to launch anything).
PoC/Screencast additionally leverages #375259.
## Supporting Material/References:
1. FF patched this somewhere between 60-62 version
2. This bug still works in Edge. As far as I know, that's 1-day.
3. Chrome downloads `settingcontent-ms` files only after a confirmation from the user.
4. This problem is already popular, so you could easily find more info.
PoC + screencast attached.
[Live PoC:](https://win-settingcontent-ms-uosardvltp.now.sh) (not sure that it works, it'd be better to test it locally)
## Impact
Launched `settingcontent-ms` could lead to code execution with user-level privileges.
Marked as "high", because it's a native OS feature, all Win users are affected.
Report Details
Additional information and metadata
State
Closed
Substate
Informative