

Protocol vulnerability allows launching malicious Windows Search by just opening...
source link: https://www.neowin.net/news/protocol-vulnerability-allows-launching-malicious-windows-search-by-just-opening-word-file/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Protocol vulnerability allows launching malicious Windows Search by just opening Word file
Following reports about Microsoft Support Diagnostic Tool vulnerabilities, researchers uncovered another zero-day that allows connection to remotely-hosted malware. The issue lies within a uniform resource identifier (URI) called "search-ms", responsible for allowing apps and links to launch searches on a computer.
Modern Windows versions, such as 11, 10, and 7, allow Windows Search to browse files locally and on remote hosts. The user can set a URI with the remote host address and the display name to appear on the title bar of the search window. Windows can launch personalized search windows using various methods, such as a web browser or Run (Win + R).
BleepingComputer says a bad actor can utilize the protocol handler to create, for example, a fake Windows Update directory and trick the user into clicking a malware disguised as a legitimate update. Still, execution requires an action from the target, and modern browsers, such as Microsoft Edge, have additional security warnings. This is where other flaws come into play.
As it turned out, one can combine the search-ms protocol handler with a new flaw in Microsoft Office OLEObject. It allows bypassing Protected View and launching URI protocol handlers without user interaction. @hackerfantastic demonstrated the idea by crafting a Word document that automatically opens a Windows Search window and connects to a remote SMB. Because search-ms allows renaming search windows, hackers can prepare "personalized" searches to mislead their targets.
Microsoft Office search-ms: URI handler exploitation, requires user-interaction. Unpatched. pic.twitter.com/iYbZNtMpnx
— hackerfantastic.crypto (@hackerfantastic) June 1, 2022
Another proof-of-concept shows an RTF document that does the same. This time, it does not even require launching Word. A new search window launches when File Explorer creates a preview on the Preview Pane.
Here is the same search-ms attack being leveraged through an RTF document when Windows Preview Pane is enabled... ;-) pic.twitter.com/AmOeGWltjm
— hackerfantastic.crypto (@hackerfantastic) June 1, 2022
Users can protect their systems by doing what Microsoft recommends to mitigate the MSDT vulnerability. Removing the search-ms protocol handler from Windows Registry will help secure a system:
- Press Win + R, type cmd and press Ctrl + Shift + Enter to run Command Prompt as Administrator.
- Type reg export HKEY_CLASSES_ROOT\search-ms search-ms.reg and press Enter to create a backup of the key.
- Type reg delete HKEY_CLASSES_ROOT\search-ms /f and press Enter to remove the key from Windows Registry.
Microsoft is working on fixing the vulnerabilities in protocol handlers and related Windows features. Still, experts claim hackers will find other handlers to exploit, and Microsoft should focus on making it impossible to launch URL handlers in the Office apps without user interaction. A similar situation happened last year with PrintNightmare when Microsoft fixed one component just for researchers to uncover other vulnerabilities.
Recommend
-
11
Decentralized Stock Trading Launching on DeFi Platform Injective ProtocolInjective Protocol, a decentralized derivatives exchange platform, will soon launch trading in tokenized stocks of major c...
-
7
Customer GuidanceWelcome to the new and improved Security Update Gui...
-
28
CVE-2021-36260 CVE-2021-36260 POC command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by s...
-
5
Background On December 11, 2021, at 8:00 pm, we published a blog disclosing Mirai and Muhstik botnet samples propagating through Log4j2 RCE vulnerability
-
8
New Vulnerability in CRI-O Container Runtime Allows Attackers Host Access Mar 26, 2022...
-
6
$15 Billion Rugpull Vulnerability in Convex Finance protocol Uncovered and Resolved
-
14
Huawei AppGallery vulnerability allows paid apps to be downloaded for free By Haroun Adamu Published 1 day ago
-
4
Vulnerability allows hackers to unlock and start Honda cars remotely The keyless entry vulnerability could potentially impact other non-Honda makes and models By
-
2
Vultron: A Protocol for Coordinated Vulnerability Disclosure ...
-
6
DEVO PROTOCOL WHITELIST OPENING OCTOBER 24TH at 21:00 EST! October 19, 2022
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK