CVE-2023-22947

Insecure folder permissions in the Windows installation path of Shibboleth Service Provider (SP) before 3.4.1 allow an unprivileged local attacker to escalate privileges to SYSTEM via DLL planting in the service executable's folder. This occurs because the installation goes under C:\opt (rather than C:\Program Files) by default. NOTE: the vendor disputes the significance of this report, stating that "We consider the ACLs a best effort thing" and "it was a documentation mistake."
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:shibboleth:service_provider:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:45

Type Values Removed Values Added
References () https://shibboleth.atlassian.net/browse/SSPCPP-961 - Exploit, Issue Tracking, Third Party Advisory () https://shibboleth.atlassian.net/browse/SSPCPP-961 - Exploit, Issue Tracking, Third Party Advisory
References () https://shibboleth.atlassian.net/wiki/spaces/SP3/pages/2065335545/Install+on+Windows#Restricting-ACLs - Third Party Advisory () https://shibboleth.atlassian.net/wiki/spaces/SP3/pages/2065335545/Install+on+Windows#Restricting-ACLs - Third Party Advisory

11 Apr 2024, 01:18

Type Values Removed Values Added
Summary
  • (es) Los permisos de carpeta inseguros en la ruta de instalación de Windows de Shibboleth Service Provider (SP) anterior a 3.4.1 permiten a un atacante local sin privilegios escalar privilegios a SYSTEM mediante la instalación de DLL en la carpeta del ejecutable del servicio. Esto ocurre porque la instalación se realiza en C:\opt (en lugar de C:\Program Files) de forma predeterminada. NOTA: el proveedor cuestiona la importancia de este informe y afirma que "Consideramos que las ACL son el mejor esfuerzo" y "fue un error de documentación".

07 Nov 2023, 04:07

Type Values Removed Values Added
Summary ** DISPUTED ** Insecure folder permissions in the Windows installation path of Shibboleth Service Provider (SP) before 3.4.1 allow an unprivileged local attacker to escalate privileges to SYSTEM via DLL planting in the service executable's folder. This occurs because the installation goes under C:\opt (rather than C:\Program Files) by default. NOTE: the vendor disputes the significance of this report, stating that "We consider the ACLs a best effort thing" and "it was a documentation mistake." Insecure folder permissions in the Windows installation path of Shibboleth Service Provider (SP) before 3.4.1 allow an unprivileged local attacker to escalate privileges to SYSTEM via DLL planting in the service executable's folder. This occurs because the installation goes under C:\opt (rather than C:\Program Files) by default. NOTE: the vendor disputes the significance of this report, stating that "We consider the ACLs a best effort thing" and "it was a documentation mistake."

Information

Published : 2023-01-11 02:15

Updated : 2024-11-21 07:45


NVD link : CVE-2023-22947

Mitre link : CVE-2023-22947

CVE.ORG link : CVE-2023-22947


JSON object : View

Products Affected

shibboleth

  • service_provider

microsoft

  • windows
CWE
CWE-427

Uncontrolled Search Path Element