Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xphp-jrmh-9rjj

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability

Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability

EPSS

Процентиль: 65%
0.00489
Низкий

7.8 High

CVSS3

Дефекты

CWE-269
CWE-59

Связанные уязвимости

CVSS3: 7.8
nvd
больше 4 лет назад

<p>An elevation of privilege vulnerability exists in Microsoft Windows when Folder redirection has been enabled via Group Policy. When folder redirection file server is co-located with Terminal server, an attacker who successfully exploited the vulnerability would be able to begin redirecting another user's personal data to a created folder.</p> <p>To exploit the vulnerability, an attacker can create a new folder under the Folder Redirection root path and create a junction on a newly created User folder. When the new user logs in, Folder Redirection would start redirecting to the folder and copying personal data.</p> <p>This elevation of privilege vulnerability can only be addressed by reconfiguring Folder Redirection with Offline files and restricting permissions, and NOT via a security update for affected Windows Servers. See the <strong>FAQ</strong> section of this CVE for configuration guidance.</p>

CVSS3: 7.8
msrc
больше 4 лет назад

Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability

CVSS3: 7.8
fstec
больше 4 лет назад

Уязвимость реализации технологии перенаправления папок Folder Redirection операционных систем Windows, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 65%
0.00489
Низкий

7.8 High

CVSS3

Дефекты

CWE-269
CWE-59