Loading HuntDB...

Uncontrolled Search Path Element allows DLL hijacking for priv esc to SYSTEM

High
G
GlassWire
Submitted None
Reported by dawouw

Vulnerability Details

Technical details and impact analysis

Privilege Escalation
GlassWire contains a DLL hijacking vulnerability that could allow an authenticated attacker to execute arbitrary code on the targeted system. The vulnerability exists due to GlassWire loading DLL files from the PATH environment variable without verification. The machine should have at least one writable PATH directory for the privilege escalation to work (e.g. having Python, Java, etc. installed). Nine different DLL's are loaded by the GlassWire Service (GWCtlSrv.exe) as SYSTEM. One DLL is loaded by the GUI (GlassWire.exe) as the currently logged in user. Class: Privilege Escalation [CAPEC-233] Class: Uncontrolled Search Path Element [CWE-427] **Affected Product** GlassWire 2.2.210.0 **Proof of Concept** Usually, Python is prepended to the PATH environment (Path=C:\Python38\Scripts\;C:\Python38\;..). For my ease and workflow, I prepended my folder to it (C:\Dima\;). Place the [x86 DLL](https://secret.club/2020/04/23/directory-deletion-shell.html) in one of the writable folder paths. *C:\Program Files (x86)\GlassWire\GWCtlSrv.exe* GlassWire (32bit) loads the following DLLs during boot as SYSTEM: - swift.dll - CSUNSAPI.dll - nfhwcrhk.dll - SureWareHook.dll - aep.dll - nfhwcrhk.dll - atasi.dll - nuronssl.dll - ubsec.dll {F904704} {F904728} *C:\Program Files (x86)\GlassWire\GlassWire.exe* Glasswire GUI (32bit) loads the following DLL after user logon as the current user: - Wtsapi32.dll.dll {F904730} I hope this helps. Please let me know if you require more information. Kind regards, Dima van de Wouw [Outflank](https://outflank.nl/) ## Impact Successful exploitation of the GlassWire service allows an attacker to gain SYSTEM privileges and inject into the GlassWire service process at boot. Successful exploitation of the GlassWire GUI allows a user to gain persistence. On shared machines, this would allow a user to move laterally to sessions of other users.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$250.00

Submitted

Weakness

Privilege Escalation