Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

mstsc.exe drivestoredirect:s:* #412

Open
59e5aaf4 opened this issue Nov 29, 2024 · 0 comments
Open

mstsc.exe drivestoredirect:s:* #412

59e5aaf4 opened this issue Nov 29, 2024 · 0 comments

Comments

@59e5aaf4
Copy link

https://learn.microsoft.com/en-us/azure/virtual-desktop/rdp-properties#drivestoredirect contains a list of documented, expected features, including the dangerous DrivesToRedirect one.

So there's some sort of a security boundary being breached here. If you manage to distribute evil .rdp files pointing to your attacker-controlled server, you get an arbitrary file write privilege as the connecting user, on the remote server. Plant something in an autostart folder (ms: "This access could enable the threat actor to install malware on the target’s local drive(s) and mapped network share(s), particularly in AutoStart folders, or install additional tools such as remote access trojans (RATs) to maintain access when the RDP session is closed.") and boom, you achieved RCE via arbitrary file write via just receiving an RDP connection by having someone click on a .rdp file you had crafted & sent however ( mail, .docx, web, etc ) to a target.

There are numerous other intended forwards control transfer capability in mstsc, documented in that ms page, but that drive sharing feature is the only one with a backwards ( +w ) accidental side effect.

Now, heh, go figure if that's in scope or not :D Have a nice day, and thanks for all the fish !

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant