Document Title: =============== DVD Creator 4.1.0 - Insecure File Permissions Vulnerability Date: ===== 2017-11-28 References: =========== https://www.vulnerability-lab.com/get_content.php?id=2104 VL-ID: ===== 2104 Common Vulnerability Scoring System: ==================================== 3.5 Vulnerability Class: ==================== Privilege Escalation Introduction: ============= Burn video to DVD from all popular SD video formats, including AVI, MP4, MPG, MPEG, 3GP, WMV, ASF, RM, RMVB, DAT, MOV, etc. Burn HD video like MTS, M2TS(AVCHD H.264), TS(MPEG-2), HD MKV(H.264, MPEG-2 HD), HD WMV(VC-1), HD MOV(H.264, MPEG-4), etc. Make photo DVD slideshows from BMP, JPEG, PNG, TIFF, GIF, etc. and combine photos and videos together to preserve your memories. (Copy of the Vendor : https://www.wondershare.com/pro/dvd-creator.html ) Abstract: ========= The vulnerability laboratory core research team discovered an insecure file permission privilege escalation vulnerability in the official wondershare DVD Creator V4.1.0 software for Microsoft Windows. Report-Timeline: ================ 2017-11-28: Public Disclosure (Vulnerability Laboratory) Status: ======== Published Affected Products: ================== Exploitation-Technique: ======================= Local Severity: ========= Medium Details: ======== An insecure file permissions vulnerability has been discovered in the official wondershare DVD Creator V4.1.0 software for Microsoft Windows. The vulnerability allows local attackers with system user accounts to elevate the access of the process to gain higher system privileges. The software is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable files with a binary of choice that is exectuable with the local system user permissions. The issue is located in the misconfigured permission values in the users and everyone group. The group/user permission of the path is assigned to the everyone group. Local attackers are able to elevate the access permission of the software process by successful exploitation via process injection attack. The security risk of the issue is estimated as medium as medium (CVSS 3.5). Exploitation of the software vulnerability requires a low privilege system user account with restricted access without user interaction. Successful exploitation of the vulnerability results in system process compromise and further manipulation or exploitation to compromise the local computer operating system. Proof of Concept: ================= The local privilege escalation vulnerability can be exploited by local attackers without user interaction and with system user account. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. Directory: C:ProgramFilesWondershareDVDCreator BsSndRpt.exe BUILTINAdministrators Everyone Allow FullControl... BugSplatHD.exe BUILTINAdministrators Everyone Allow FullControl... CrashService.exe BUILTINAdministrators Everyone Allow FullControl... CustomizedTool.exe BUILTINAdministrators Everyone Allow FullControl... DVDCreator.exe BUILTINAdministrators Everyone Allow FullControl... unins000.exe BUILTINAdministrators Everyone Allow FullControl... WSOverlay.exe BUILTINAdministrators Everyone Allow FullControl... Wondershare Helper Compact.exe BUILTINAdministrators Everyone Allow FullControl... BsSndRpt.exe Everyone:(ID)F <----------------------- NT AUTHORITYSYSTEM:(ID)F BUILTINAdministrators:(ID)F BUILTINUsers:(ID)R BugSplatHD.exe Everyone:(ID)F <----------------------- NT AUTHORITYSYSTEM:(ID)F BUILTINAdministrators:(ID)F BUILTINUsers:(ID)R CrashService.exe Everyone:(ID)F <----------------------- NT AUTHORITYSYSTEM:(ID)F BUILTINAdministrators:(ID)F BUILTINUsers:(ID)R CustomizedTool.exe Everyone:(ID)F <----------------------- NT AUTHORITYSYSTEM:(ID)F BUILTINAdministrators:(ID)F BUILTINUsers:(ID)R DVDCreator.exe Everyone:(ID)F <----------------------- NT AUTHORITYSYSTEM:(ID)F BUILTINAdministrators:(ID)F BUILTINUsers:(ID)R unins000.exe Everyone:(ID)F <----------------------- NT AUTHORITYSYSTEM:(ID)F BUILTINAdministrators:(ID)F BUILTINUsers:(ID)R WSOverlay.exe Everyone:(ID)F <----------------------- NT AUTHORITYSYSTEM:(ID)F BUILTINAdministrators:(ID)F BUILTINUsers:(ID)R Path : C:ProgramFilesWondershareDVDCreator Owner : BUILTINAdministrators Group : MACHINENone Access : Everyone Allow FullControl <----------------------- NT SERVICETrustedInstaller Allow FullControl NT SERVICETrustedInstaller Allow 268435456 NT AUTHORITYSYSTEM Allow FullControl NT AUTHORITYSYSTEM Allow 268435456 BUILTINAdministrators Allow FullControl BUILTINAdministrators Allow 268435456 BUILTINUsers Allow ReadAndExecute, Synchronize BUILTINUsers Allow -1610612736 CREATOR OWNER Allow 268435456 Medium Mandatory Level (Default) [No-Write-Up] RW Everyone FILE_ALL_ACCESS <----------------------- RW NT SERVICETrustedInstaller FILE_ALL_ACCESS RW NT AUTHORITYSYSTEM FILE_ALL_ACCESS RW BUILTINAdministrators FILE_ALL_ACCESS R BUILTINUsers FILE_LIST_DIRECTORY FILE_READ_ATTRIBUTES FILE_READ_EA FILE_TRAVERSE SYNCHRONIZE READ_CONTROL Risk: ===== The security risk of the local privilege escalation vulnerability in the wondershare DVD Creator V4.1.0 software for Microsoft Windows is estimated as medium (CVSS 3.5). Credits: ======== SaifAllah benMassaoud [saifmassaoudi18@gmail.com] - @benmassaou - https://www.vulnerability-lab.com/show.php?user=S.AbenMassaoud Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability Labs or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability mainly for incidental or consequential damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data. We have no need for criminal activities or membership requests. We do not publish advisories or vulnerabilities of religious-, militant- and racist- hacker/analyst/researcher groups or individuals. We do not publish trade researcher mails, phone numbers, conversations or anything else to journalists, investigative authorities or private individuals. Domains: www.vulnerability-lab.com - www.vulnerability-db.com - www.evolution-sec.com Programs: vulnerability-lab.com/submit.php - vulnerability-lab.com/list-of-bug-bounty-programs.php - vulnerability-lab.com/register.php Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php Social: twitter.com/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab Any modified copy or reproduction, including partially usages, of this file, resources or information requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or edit our material contact (admin@) to get an ask permission. Copyright © 2017 | Vulnerability Laboratory - [Evolution Security GmbH]™