Insecure folder permissions in the Windows installation path of Shibboleth Service Provider (SP) before 3.4.1 allow an unprivileged local attacker to escalate privileges to SYSTEM via DLL planting in the service executable's folder. This occurs because the installation goes under C:\opt (rather than C:\Program Files) by default. NOTE: the vendor disputes the significance of this report, stating that "We consider the ACLs a best effort thing" and "it was a documentation mistake."
References
Link | Resource |
---|---|
https://shibboleth.atlassian.net/browse/SSPCPP-961 | Exploit Issue Tracking Third Party Advisory |
https://shibboleth.atlassian.net/wiki/spaces/SP3/pages/2065335545/Install+on+Windows#Restricting-ACLs | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-01-11T00:00:00
Updated: 2023-01-11T00:00:00
Reserved: 2023-01-11T00:00:00
Link: CVE-2023-22947
JSON object: View
NVD Information
Status : Modified
Published: 2023-01-11T02:15:11.550
Modified: 2024-05-17T02:19:47.080
Link: CVE-2023-22947
JSON object: View
Redhat Information
No data.
CWE