CVE-2023-22947

Insecure folder permissions in the Windows installation path of Shibboleth Service Provider (SP) before 3.4.1 allow an unprivileged local attacker to escalate privileges to SYSTEM via DLL planting in the service executable's folder. This occurs because the installation goes under C:\opt (rather than C:\Program Files) by default. NOTE: the vendor disputes the significance of this report, stating that "We consider the ACLs a best effort thing" and "it was a documentation mistake."
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:shibboleth:service_provider:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:45

Type Values Removed Values Added
References () https://shibboleth.atlassian.net/browse/SSPCPP-961 - Exploit, Issue Tracking, Third Party Advisory () https://shibboleth.atlassian.net/browse/SSPCPP-961 - Exploit, Issue Tracking, Third Party Advisory
References () https://shibboleth.atlassian.net/wiki/spaces/SP3/pages/2065335545/Install+on+Windows#Restricting-ACLs - Third Party Advisory () https://shibboleth.atlassian.net/wiki/spaces/SP3/pages/2065335545/Install+on+Windows#Restricting-ACLs - Third Party Advisory

07 Nov 2023, 04:07

Type Values Removed Values Added
Summary ** DISPUTED ** Insecure folder permissions in the Windows installation path of Shibboleth Service Provider (SP) before 3.4.1 allow an unprivileged local attacker to escalate privileges to SYSTEM via DLL planting in the service executable's folder. This occurs because the installation goes under C:\opt (rather than C:\Program Files) by default. NOTE: the vendor disputes the significance of this report, stating that "We consider the ACLs a best effort thing" and "it was a documentation mistake." Insecure folder permissions in the Windows installation path of Shibboleth Service Provider (SP) before 3.4.1 allow an unprivileged local attacker to escalate privileges to SYSTEM via DLL planting in the service executable's folder. This occurs because the installation goes under C:\opt (rather than C:\Program Files) by default. NOTE: the vendor disputes the significance of this report, stating that "We consider the ACLs a best effort thing" and "it was a documentation mistake."

Information

Published : 2023-01-11 02:15

Updated : 2025-04-07 19:15


NVD link : CVE-2023-22947

Mitre link : CVE-2023-22947

CVE.ORG link : CVE-2023-22947


JSON object : View

Products Affected

microsoft

  • windows

shibboleth

  • service_provider
CWE
CWE-427

Uncontrolled Search Path Element