Loading HuntDB...

curl still vulnerable to SMB access smuggling via FILE URL on Windows

C
curl
Submitted None
Reported by tsedlmeyer

Vulnerability Details

Technical details and impact analysis

Improper Input Validation
## Summary: The released fix for CVE-2019-15601, SMB access smuggling via FILE URL on Windows, leaves curl still vulnerable to SMB access smuggling via FILE URLs. - FILE URLs formatted as `file:////smb_server/smb_share/file` are not filtered. - FILE URLs which point to the global DOS name space, \??\, and formatted as `file:///%3f%3f/UNC/smb_server/smb_share/file_name` or `file:///%3f%3f/GLOBAL/UNC/smb_server/smb_share/file` are not filtered. ## Steps To Reproduce: 1. `curl file:////localhost/c$/windows/win.ini` 2. `curl file:///%3f%3f/UNC/localhost/c$/windows/win.ini` 3. `curl file:///%3f%3f/GLOBAL/UNC/localhost/c$/windows/win.ini` The above examples will return the contents of C:\Windows\win.ini utilizing SMB to fetch the file via the local administrative share for the C drive. This will also work with remote shares. ## Impact A properly crafted URL could cause a user to unknowingly access a remote file.

Related CVEs

Associated Common Vulnerabilities and Exposures

No description available

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Improper Input Validation