HomeCyber BalkansResearchers Utilized Windows Charset Conversion Feature for Remote Code Execution

Researchers Utilized Windows Charset Conversion Feature for Remote Code Execution

Published on

spot_img

Researchers have unveiled a systemic vulnerability within the Windows operating system, utilizing its “Best-Fit” charset conversion feature to circumvent security checks and execute remote code. This discovery sheds light on far-reaching implications across various applications, with potential real-world exploitation scenarios affecting commonly used tools such as Microsoft Excel, PHP-CGI, and more.

Windows systems function on dual encoding systems, Unicode (UTF-16) for modern compatibility, and legacy ANSI for older applications. To bridge these two systems, Windows makes use of an internal feature known as “Best-Fit” mapping, which approximates characters unsupported by a specific code page to visually or functionally similar counterparts. However, while this feature was designed with compatibility in mind, researchers have shown that it inadvertently creates attack vectors, including Path Traversal, Argument Splitting, and Remote Code Execution (RCE).

The study brought to light multiple CVEs, including CVE-2024-4577 (PHP-CGI RCE) and CVE-2024-49026 (Microsoft Excel RCE). The PHP-CGI vulnerability allows attackers to compromise servers with Chinese or Japanese code pages by appending a specially crafted query string to bypass security checks. On the other hand, the Microsoft Excel vulnerability involves exploiting the “Open-With” feature to bypass argument parsing controls and achieve RCE by injecting malicious arguments.

One exploit technique, Filename Smuggling, relies on characters converted into path delimiters on specific code pages, allowing for directory traversal. By manipulating filenames, attackers can bypass directory restrictions and potentially access sensitive files like configuration settings. Argument Splitting, another attack method, involves using fullwidth versions of special characters to inject unexpected arguments into Windows command-line processes. Furthermore, Environment Variable Confusion exploits the best fit behavior for environment variables, enabling attackers to manipulate query strings and HTTP headers passed via CGI scripts to bypass character restrictions.

The vulnerabilities presented in case studies such as the Cuckoo Sandbox exploit and ElFinder RCE showcase the severity of these issues. While some vendors have promptly patched their software, others have deferred the responsibility to developers to sanitize inputs. Microsoft, in acknowledging certain severe cases, has not issued fixes for broader systemic issues associated with legacy Windows functionality.

Recommendations for developers and security experts include utilizing Wide-Character APIs, sanitizing inputs, enabling secure default settings, and monitoring updates for patches from affected vendors and libraries. The exposure of vulnerabilities like CVE-2024-4577 and CVE-2024-49026 underscores the risks involved in legacy compatibility features within modern software environments. As attackers exploit low-level vulnerabilities like Windows’ “Best-Fit” charset behavior, it becomes imperative for the industry to prioritize systemic changes and adhere to secure coding standards.

Source link

Latest articles

There are more cyber attacks with less loot

Experts across all industries have noted a significant increase in awareness regarding the risks...

Canadian Man Faces Charges in $65 Million Cryptocurrency Hacking Scams

A Canadian man, Andean Medjedovic, found himself at the center of a criminal indictment...

Ransomware payment value decreased by over 30% in 2024

After a year of record payments to cyber criminals, the tide seems to be...

Data breach at Vorwerk: Hackers steal Thermomix user data

In a recent cybersecurity breach, hackers have managed to gain access to user data...

More like this

There are more cyber attacks with less loot

Experts across all industries have noted a significant increase in awareness regarding the risks...

Canadian Man Faces Charges in $65 Million Cryptocurrency Hacking Scams

A Canadian man, Andean Medjedovic, found himself at the center of a criminal indictment...

Ransomware payment value decreased by over 30% in 2024

After a year of record payments to cyber criminals, the tide seems to be...