CVE-2024-29188

Improper Link Resolution Before File Access ('Link Following') (CWE-59)

Published: Mar 24, 2024 / Updated: 8mo ago

010
CVSS 7.9EPSS 0.05%High
CVE info copied to clipboard

WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. The custom action behind WiX's `RemoveFolderEx` functionality could allow a standard user to delete protected directories. `RemoveFolderEx` deletes an entire directory tree during installation or uninstallation. It does so by recursing every subdirectory starting at a specified directory and adding each subdirectory to the list of directories Windows Installer should delete. If the setup author instructed `RemoveFolderEx` to delete a per-user folder from a per-machine installer, an attacker could create a directory junction in that per-user folder pointing to a per-machine, protected directory. Windows Installer, when executing the per-machine installer after approval by an administrator, would delete the target of the directory junction. This vulnerability is fixed in 3.14.1 and 4.0.5.

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H

Timeline

Vendor Advisory

GitHub Advisories released a security advisory.

Mar 23, 2024 at 12:15 AM
CVE Assignment

NVD published the first details for CVE-2024-29188

Mar 24, 2024 at 1:15 PM
First Article

Feedly found the first article mentioning CVE-2024-29188. See article

Mar 24, 2024 at 8:21 PM / National Vulnerability Database
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (192645)

Mar 28, 2024 at 4:15 AM
EPSS

EPSS Score was set to: 0.05% (Percentile: 13.2%)

Mar 28, 2024 at 4:04 PM
Threat Intelligence Report

The vulnerability CVE-2024-29188 in the WiX Toolset's RemoveFolderEx function allows for potential exploitation by attackers to compromise systems during the installation process. This critical vulnerability has a CVSS score of [insert score if available], with proof-of-concept exploits already circulating in the wild. Mitigations include updating to the latest version of WiX Toolset and implementing detection mechanisms to identify vulnerable installers, as downstream impacts may affect other third-party vendors utilizing the tool. See article

Sep 12, 2024 at 2:43 PM
Static CVE Timeline Graph

Patches

Github Advisory
+null more

Links to Mitre Att&cks

T1547.009: Shortcut Modification
+null more

Attack Patterns

CAPEC-132: Symlink Attack
+null more

Vendor Advisory

[GHSA-jx4p-m4wm-vvjg] Malicious directory junction can cause WiX RemoveFoldersEx to possibly delete elevated files
RemoveFolderEx deletes an entire directory tree during installation or uninstallation. If the setup author instructed RemoveFolderEx to delete a per-user folder from a per-machine installer, an attacker could create a directory junction in that per-user folder pointing to a per-machine, protected directory.

References

Microsoft Windows MSI Installer - Repair to SYSTEM - A detailed journey
This article by our researcher Michael Baer for the SEC Consult Vulnerability Lab will explain different attacks against MSI installers and present an open-source analyzer tool named "msiscan" in order to automatically detect potential security issues. Repair functions of Microsoft Windows MSI installers can be vulnerable in several ways, for instance allowing local attackers to escalate their privileges to SYSTEM rights.

News

Microsoft Windows MSI Installer - Repair to SYSTEM - A detailed journey
This article by our researcher Michael Baer for the SEC Consult Vulnerability Lab will explain different attacks against MSI installers and present an open-source analyzer tool named "msiscan" in order to automatically detect potential security issues. Repair functions of Microsoft Windows MSI installers can be vulnerable in several ways, for instance allowing local attackers to escalate their privileges to SYSTEM rights.
Autodesk InfoWorks WS Pro 2024.5.2 Win x64
Creating Workspaces in InfoWorks WS Pro This video is intended for modelers, consultants, and engineers looking to highlight, present, and share specific information within their network and database. When the model has been created, InfoWorks WS Pro allows you to simulate the behaviour of the network under a range of conditions.
Autodesk InfoWorks WS Pro 2024.5.2 Win x64
Creating Workspaces in InfoWorks WS Pro This video is intended for modelers, consultants, and engineers looking to highlight, present, and share specific information within their network and database. When the model has been created, InfoWorks WS Pro allows you to simulate the behaviour of the network under a range of conditions.
Autodesk InfoWorks WS Pro 2024.5.2 Win x64
This means, for example, that the WS Pro UI can use an Autodesk Single Sign On while a remote engine could use a Thales license. Creating Workspaces in InfoWorks WS Pro This video is intended for modelers, consultants, and engineers looking to highlight, present, and share specific information within their network and database.
Autodesk InfoWorks WS Pro 2024.5.2 Win x64
Creating Workspaces in InfoWorks WS Pro This video is intended for modelers, consultants, and engineers looking to highlight, present, and share specific information within their network and database. When the model has been created, InfoWorks WS Pro allows you to simulate the behaviour of the network under a range of conditions.
See 22 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:Low
User Interaction:Required
Scope:Changed
Confidentiality:None
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI