-
Notifications
You must be signed in to change notification settings - Fork 77
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
win64 client: Password and priv keys accessible by local Users group #826
Comments
Hello, Thanks for your interest. What is your suggestion for fixing this? |
Recursively removing Users access from the burp install directory should do it. Pretty easy in theory. I don't think changing that would negatively affect any legitimate usage. I'll check out the installer source and see if I can help. It's been awhile but I've done NSIS installers before. |
Awesome, thanks for your input. |
Wow. That's kinda way more than kinda bad. I've never used BURP or Bacula for Windows DR anyway, so I wouldn't have noticed this, but I do have an RFP sitting in my inbox right now for such a deployment, so I'll be watching this closely for resolution. In the meantime, a kludgy work-around will suffice if my proposal is (as expected) accepted by the customer. |
@BlessDeix92 I don't think NSIS provides an easy way to remove those ACL out of the box (but there are plugins, see https://nsis.sourceforge.io/Talk:AccessControl_plug-in)
|
A better idea might be to move configuration and generated files out of Program Files completely and put them in somewhere like ProgramData instead. Hey grke, what's the minimum Windows version you want to support? I'll look into this over the weekend. I don't even know if burp uses NSIS or if it's a different installer! I'll figure it out later. For now people can just recursively remove Users permissions from the burp install directory and that fixes it. For most small business and home environments where there is only a single local user who has local admin rights anyway, this issue has no negative impact. That's probably >90% of the userbase. |
Hello, Burp uses NSIS. Fairly recently, I containerised the Windows build tools, here: I don't know much about Windows versions, except that burp worked under XP at some point in the past and I don't know whether it still does. I have test Windows 2008 server VMs, so let's say Windows 2008. |
Re: "kinda way more than kinda bad"
Having said that, it is really great to see people finding ways that they would like to improve burp, thanks for all the input. |
lolz, yes. That was me :) Like I said, I've never had much use for using BURP or Bacula as a DR solution for Windows. In fact, starting at the career point in my life of 1995, As an MCT for Microsoft I had two solidly firm objectives: 1.) To teach my students to pass their exams, earning their MCSE certifications 2.) To poach new customers so I could convince them to eradicate Microsoft products from their enterprise and use Linux and the BSDs instead. I got greenlighted on that contract, which plays out like this: Build an onsite private cloud based on SuSE hosts with KVM virtual machines for Windows workstations. Blow away Windows on the desktop, install Slackware Linux and manage those installations with Puppet, using Remmina to access their virtual Windows machines as workstations when need be. Aside from snapshots, Duplicity, and plain old tar & rsync for critical, smaller parts of the file systems, BURP figures into the larger DR plan as a whole. Perhaps I should have also mentioned that it's, "kinda way more than kinda bad to use Microsoft Windows", in the first place lolz. No complaints here, BURP is the foshizzle! :) |
This should probably have been reported privately as a security vulnerability (potential privilege escalation, arbitrary file read) and a 90 day window given to fix this without going public. Even assigned a CVE :) As a standard user, I can now access any file on the computer by restoring it from the burp server.
With a complete copy of the target's file system it shouldn't be hard to find some credentials and work your way towards administrative access to the target. The solution suggested by @BlessDeix92 could be a good starting point. Move all custom data (config, certificate data, logs) out of Program Files and somewhere where standard users have no access to. |
Hello, Thank you for reminding me about this. |
I am testing burp for the first time and saw that after installing the client on a Windows 10 system that the entire burp install directory and all files are readable by the local Users group, which means unprivileged local users have read access to things like the client password and private TLS keys.
This seems kinda bad.
I am testing with version 2.2.18, which is the current stable release.
The text was updated successfully, but these errors were encountered: