curl still vulnerable to SMB access smuggling via FILE URL on Windows
C
curl
Submitted None
Actions:
Reported by
tsedlmeyer
Vulnerability Details
Technical details and impact analysis
## Summary:
The released fix for CVE-2019-15601, SMB access smuggling via FILE URL on Windows, leaves curl still vulnerable to SMB access smuggling via FILE URLs.
- FILE URLs formatted as `file:////smb_server/smb_share/file` are not filtered.
- FILE URLs which point to the global DOS name space, \??\, and formatted as `file:///%3f%3f/UNC/smb_server/smb_share/file_name` or `file:///%3f%3f/GLOBAL/UNC/smb_server/smb_share/file` are not filtered.
## Steps To Reproduce:
1. `curl file:////localhost/c$/windows/win.ini`
2. `curl file:///%3f%3f/UNC/localhost/c$/windows/win.ini`
3. `curl file:///%3f%3f/GLOBAL/UNC/localhost/c$/windows/win.ini`
The above examples will return the contents of C:\Windows\win.ini utilizing SMB to fetch the file via the local administrative share for the C drive. This will also work with remote shares.
## Impact
A properly crafted URL could cause a user to unknowingly access a remote file.
Related CVEs
Associated Common Vulnerabilities and Exposures
CVE-2019-15601
UNKNOWN
No description available
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
Improper Input Validation