Powered by ACTIVECYBER, LLC
Powered by ACTIVECYBER, LLC
Docker is a tool designed to make it easier to create, deploy, and run applications by using containers. Containers allow a developer to package an application with all of the parts it needs, such as libraries and dependencies, then deploy it as one package. By doing so, thanks to the container, the developer can rest assured that the application will run on any other machine regardless of any customized settings that machine might have which could differ from the machine used for writing and testing the code. Docker Desktop is used for building and sharing containerized applications and microservices for Mac and Windows machines.
During the process of analyzing the latest version of Docker Desktop for Windows at the time, we’ve found that the diagnostics functionality executes privileged operations under a folder that is controllable by standard users who are members of the docker-users group, leading to an arbitrary DACL permissions overwrite.
Let’s start by kicking off diagnostics data collection while Process Monitor is running in the background. Please note all of the below operations were performed under the NT AUTHORITY\SYSTEM context with no user impersonation.
1. com.docker.diagnose.exe process creates a Globally Unique Identifier (GUID) folder under the current logged-on user AppData folder. For those of you who don’t know, Windows applications often store their data and settings in an AppData folder, and each Windows user account has its own.
2. com.docker.diagnose.exe process creates a 14-digit zip file under the newly created folder with the following format <year><month><day><hour><minute><second>.zip.
3. com.docker.diagnose.exe process starts gathering diagnostics data and then writes the results to the zip file.
4. com.docker.diagnose.exe process finishes writing to the zip file and closes the handle to it.
5. com.docker.service process grants full control permissions for the everyone group to the zip file among other operations.
In essence, we have privileged processes that perform several operations on a file under a folder that is controllable by a standard non-privileged user, leading to an arbitrary DACL permissions overwrite. From a high-level overview, the following are the steps needed to exploit this vulnerability.
In our case, we’ve created 60 hardlinks (one per second) all pointing to C:\Windows\System32\DriverStore\FileRepository\prnms003.inf_amd64_e4ff50d4d5f8b2aa\Amd64\PrintConfig.dll system DLL (please be wary the file location may vary based on the Windows version). Once the permissions were modified, we used the method discovered by Andrea Pierini here to achieve elevation of privileges. It’s worth mentioning, that we can trigger the diagnostics data collection from the command line as mentioned in Docker documentation.
However, the process will run under the context of the invoking user which leaves us no choice other than using the GUI.
Please note that we need to wait a few minutes for the data collection to complete as mentioned in the exploitation steps above before DACL permissions overwrite takes place.
At this point, we reported the vulnerability to the Docker security team and the patch was released on March 13, 2020 addressing this vulnerability. Furthermore, Microsoft added hardlink mitigation to Windows 10 in the March cumulative update. After installing this update, Windows will require write access on the target file; otherwise, the hardlink will fail.
Lastly, we would like to thank Andrea Pierini, Ruben Boonen, and James Forshaw for their prior work and tools that made this finding possible. Feel free to reach out to email@example.com if you have any questions. Also, see the link here for a complete list of ACTIVELabs advisories.
Your comment will be posted after it is approved.
Leave a Reply.
ACTIVELabs was created in 2018 to hunt and research undiscovered vulnerabilities, report them to vendors via responsible disclosure programs, publish advisories, develop and validate new patches, and to share this information for the advancement of the cybersecurity community. ACTIVELabs was established with the mission of securing our ever-growing client base, partnerships, and the technology community as a whole.
We are actively providing the community with verified findings and research that leads to the creation of new Common Vulnerabilities and Exposures (CVEs) and updates to the National Vulnerability Database (NVD). For a full listing of all of our Advisories, visit our GitHub page here.
888 Bestgate Road, Suite 316
Annapolis, MD 21401 202.499.3774