[prev in list] [next in list] [prev in thread] [next in thread] 

List:       pen-test
Subject:    Re: Citrix application breakout - take care of Microsoft calculator
From:       "Shreyas Zare" <shreyas () technitium ! com>
Date:       2008-03-18 10:31:13
Message-ID: 5dd3856e0803180319y344da16cs1aba1ca386ef4dbb () mail ! gmail ! com
[Download RAW message or body]

Also, you can disable the Task Scheduler service so that AT wont work.

On 3/18/08, Robert S. Slifkin <rob@slifkin.net> wrote:
> Yes, that can be particularly dangerous.  From there you can launch the
>  explorer shell to get a full desktop and everything with System
>  privileges.
>
>
>  ____________________________________
>  Robert S. Slifkin
>  Email: Rob@slifkin.net
>  Phone: 203.962.3878
>
>  -----Original Message-----
>  From: listbounce@securityfocus.com [mailto:listbounce@securityfocus.com]
>  On Behalf Of Bill Stout
>  Sent: Monday, March 17, 2008 12:32 AM
>  To: pen-test@securityfocus.com
>  Subject: Re: Citrix application breakout - take care of Microsoft
>  calculator
>
>
>  Or this command string, which will pop up a second command window, but
>  with 'system' privileges.
>
>  c:\> at 21:00 /interactive %systemroot%\system32\cmd.exe
>
>
>  Bill Stout
>
>
>  ----- Original Message ----
>  > From: "infolookup@gmail.com" <infolookup@gmail.com>
>  > To: Erik Soosalu <eriks@nationalfastfreight.com>;
>  > listbounce@securityfocus.com; pen-test@securityfocus.com
>  > Sent: Wednesday, March 12, 2008 4:46:34 AM
>  > Subject: Re: Citrix application breakout - take care of Microsoft
>  > calculator
>  >
>  > A discussion of this nature started a while back where someone noted
>  > that you could if giving regular user rights on a Citrix terminal
>  > still browse the network for shares.
>  >
>  > Right click your desktop, select new shortcut and browse to
>  > system32/cmd.exe get a list of host name and available shares.
>  >
>  > Then open up MS word and create a link to the share, click on it then
>  > you are browsing the share, or network place in question, in some
>  > cases you can even browse the underlining Citrix server that you are
>  > connected too, or create a folder and copy anything to it.
>  > Sent from my Verizon Wireless BlackBerry
>  >
>  > -----Original Message-----
>  > From: "Erik Soosalu"
>  >
>  > Date: Mon, 10 Mar 2008 12:50:40
>  > To:
>  > Subject: RE: Citrix application breakout - take care of Microsoft
>  > calculator
>  >
>  >
>  > Once you're in Notepad, File->Open, browse to Windows/system32, find
>  > cmd.exe right click and open and you have a command prompt on the box.
>
>  > Of course, your could specify any UNC and get a file to load from
>  > wherever you want. Not sure what the actual run permissions would
>  be....
>  >
>  > Erik
>  >
>  >
>  >
>  > ________________________________
>  >
>  > From: listbounce@securityfocus.com on behalf of Stefan Gora
>  > Sent: Fri 3/7/2008 6:13 AM
>  > To: pen-test@securityfocus.com
>  > Subject: Citrix application breakout - take care of Microsoft
>  > calculator
>  >
>  >
>  >
>  > Dear all,
>  >
>  > I'm not shure if the following issue is already known or exciting,
>  > nevertheless the following attack vector found during a penetration
>  > test might be interesting:
>  >
>  > A customer has built a Citrix environment for a partner company to
>  > provide access to a specific application. This application was
>  > intended to be the only application accessible for this partner. It
>  > was possible to get a remote task manager with CRTL-F3, but no other
>  > way of interacting with the Citrix Server (e.g. through printing or
>  so).
>  >
>  > Unfortunately they have integrated Microsoft's calculator into the
>  > application. A bad idea - guess why ;-).
>  >
>  > Using the calculator you are able to do funny stuff: Open the
>  > calculator and click "info". Klick on the licence agreement and here
>  > you go, you have got an editor. With this you can use "open file" and
>  > browse the server, find for example Word and rightclick on "Open" -
>  > Word is running, and all other applications which you like as well ...
>  >
>  > I think this can easily be fixed using more restrictive file
>  > permissions, but I thought maybe some of you might find this
>  > information useful.
>  >
>  > Stefan
>  >
>  > --
>  > --------------------------------------------------------
>  > Identity Management Symposium 22.-23.04.2008 KA/Ettlingen
>  > http://www.identity-management-symposium.de
>  >
>  > --------------------------------------------------------
>  >
>  > Stefan Gora
>  > Security Consultant
>  >
>  > Secorvo Security Consulting GmbH
>  > Ettlinger Strasse 12-14, D-76137 Karlsruhe Tel. +49 721 255171-302,
>  > Fax +49 721 255171-100 stefan.gora@secorvo.de, http://www.secorvo.de
>  > PGP: 5EAD 34FE F3C1 0FEB 058F 4DD0 E6B3 FF4A
>  >
>  > Mannheim HRB 108319, Geschaeftsfuehrer: Dirk Fox
>  >
>  > ----------------------------------------------------------------------
>  > --
>  > This list is sponsored by: Cenzic
>  >
>  > Need to secure your web apps NOW?
>  > Cenzic finds more, "real" vulnerabilities fast.
>  > Click to try it, buy it or download a solution FREE today!
>  >
>  > http://www.cenzic.com/downloads
>  > ----------------------------------------------------------------------
>  > --
>  >
>  >
>  >
>  >
>  >
>  > ----------------------------------------------------------------------
>  > --
>  > This list is sponsored by: Cenzic
>  >
>  > Need to secure your web apps NOW?
>  > Cenzic finds more, "real" vulnerabilities fast.
>  > Click to try it, buy it or download a solution FREE today!
>  >
>  > http://www.cenzic.com/downloads
>  > ----------------------------------------------------------------------
>  > --
>
>  ------------------------------------------------------------------------
>  This list is sponsored by: Cenzic
>
>  Need to secure your web apps NOW?
>  Cenzic finds more, "real" vulnerabilities fast.
>  Click to try it, buy it or download a solution FREE today!
>
>  http://www.cenzic.com/downloads
>  ------------------------------------------------------------------------
>
>
>  ------------------------------------------------------------------------
>  This list is sponsored by: Cenzic
>
>  Need to secure your web apps NOW?
>  Cenzic finds more, "real" vulnerabilities fast.
>  Click to try it, buy it or download a solution FREE today!
>
>  http://www.cenzic.com/downloads
>  ------------------------------------------------------------------------
>
>



-- 
("Computers are useless. They can only give you answers." - Pablo Picasso)

Shreyas Zare
Co-Founder, Technitium
eMail: shreyas@technitium.com

..::< The Technitium Team >::..
Visit us at www.technitium.com
Contact us at theteam@technitium.com

Technitium Personal Computers
We believe in quality.
Visit http://pc.technitium.com for details.

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic