Electron contextIsolation RCE via preload code
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Ovaj kod otvara http(s) linkove sa podrazumevanim pretraživačem:
Nešto poput file:///C:/Windows/systemd32/calc.exe
moglo bi se koristiti za izvršavanje kalkulatora, SAFE_PROTOCOLS.indexOf
to sprečava.
Stoga, napadač bi mogao ubrizgati ovaj JS kod putem XSS-a ili proizvoljne navigacije stranica:
Kao što će poziv SAFE_PROTOCOLS.indexOf
uvek vraćati 1337, napadač može zaobići zaštitu i izvršiti kalkulator. Konačni exploit:
Check the original slides for other ways to execute programs without having a prompt asking for permissions.
Apparently another way to load and execute code is to access something like file://127.0.0.1/electron/rce.jar
Example from https://mksben.l0.cm/2020/10/discord-desktop-rce.html?m=1
When checking the preload scripts, I found that Discord exposes the function, which allows some allowed modules to be called via DiscordNative.nativeModules.requireModule('MODULE-NAME')
, into the web page.
Here, I couldn't use modules that can be used for RCE directly, such as child_process module, but I found a code where RCE can be achieved by overriding the JavaScript built-in methods and interfering with the execution of the exposed module.
The following is the PoC. I was able to confirm that the calc application is popped up when I call the getGPUDriverVersions
function which is defined in the module called "discord_utils" from devTools, while overriding the RegExp.prototype.test
and Array.prototype.join
.
Funkcija getGPUDriverVersions
pokušava da izvrši program koristeći biblioteku "execa", kao što je sledeće:
Obično execa pokušava da izvrši "nvidia-smi.exe", koji je naveden u nvidiaSmiPath
varijabli, međutim, zbog prepisanog RegExp.prototype.test
i Array.prototype.join
, argument se menja u "calc" u unutrašnjem procesiranju _execa_**.
Specifično, argument se menja promenom sledeće dve komponente.
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)