Security

CSO

HTTP your way into Citrix's Virtual Apps and Desktops with fresh exploit code

'Once again, we've lost a little more faith in the internet,' researcher says


Researchers are publicizing a proof of concept (PoC) exploit for what they're calling an unauthenticated remote code execution (RCE) vulnerability in Citrix's Virtual Apps and Desktops.

The exploit, discovered by watchTowr, can be carried out using only an HTTP request, handing an attacker system privileges on the vendor's virtual desktop infrastructure (VDI) product.

Citrix has urged customers to install hot fixes (see below) and denies the vuln can be described as an "unauthenticated RCE."

Sina Kheirkhah, vulnerability researcher at watchTowr, however, states: "This one is a privesc bug yielding system privileges for any VDI user, which is actually a lot worse than it might initially sound since that's system privileges on the server that hosts all the applications and access is 'by design' – allowing an attacker to impersonate any user, including administrators, and monitor behavior, connectivity."

Kheirkhah added: "Since everything is so seamless and portable, it's an easy jump from there to impersonating users or 'shadowing' them, observing their every action. The centralized administration system can easily become a panopticon."

The vulnerability lies in Virtual Apps and Desktops' Session Recording Manager feature, which records a video stream of any given user's session, their keystrokes, and mouse movements. Ideal for monitoring, troubleshooting, compliance, etc. 

Sessions are sent to the Session Recording Server, as watchTowr referred to it, and then stored in a database. According to Citrix's documentation, the files are sent as message bytes via the Microsoft Message Queuing (MSMQ) service.

Kheirkhah explained that MSMQ essentially allows two processes to communicate via a queue, but that also means the data must be serialized so the transferred data can be read by the other side.

Digging into the serialization process, watchTowr found a number of issues. The first, less severe one was that the queue initialization process was littered with overly open permissions, allowing anyone to insert messages into the queue.

The second, worse issue was the finding that BinaryFormatter, a .NET class, is used for deserialization. The problem here is that the class is considered obsolete and irreparably insecure. Its creator, Microsoft, even classifies it as "dangerous."

"The BinaryFormatter type is dangerous and is not recommended for data processing," reads Microsoft's documentation

"Applications should stop using BinaryFormatter as soon as possible, even if they believe the data they're processing to be trustworthy. BinaryFormatter is insecure and can't be made secure."

Exploiting the vulnerability can be achieved using an HTTP request, despite MSMQ being reached via TCP port 1801. Kheirkhah noted his surprise that Citrix enabled MSMQ over HTTP, which seems unnecessary given that none of the product's functionality uses it and it is typically disabled by default.

"Perhaps some developer accidentally enabled it, committed the code, and forgot about it," he said. "We'll leave the root-cause-analysis to Citrix themselves."

Kheirkhah's blog details the makeup of the HTTP packet required to exploit the flaw and the research in greater depth. As ever, though, when PoC code is released, it's always a good idea to apply the relevant patches as soon as possible.

Speaking of, Citrix published a security advisory today after watchTowr went live with its blog. It addressed the exploit with a number of hotfixes for affected versions and urged customers to install them.

Clash of heads

A Citrix spokesperson also told The Register it rejects watchTowr's assertion that the vulnerability can be described as an unauthenticated RCE.

"Please note that based on the analysis by the security team, this is not an unauthenticated RCE. It is an authenticated RCE that can be done only as a NetworkService account," said the spokesperson.

We're told Citrix plans to publish a blog later today outlining exactly why it disagrees with the researchers over at watchTowr. A spokesperson for the latter, conversely, told The Register in response to the vendor's advisory that Citrix is downplaying the severity of the issue.

"Citrix is downplaying the severity of this vulnerability as a medium priority when it's really point-click-full-takeover," said watchTowr.

Citrix assigned two separate CVE identifiers for the vulnerabilities that underpin the exploit:

The descriptions of the vulnerabilities supplied by Citrix do indeed downplay the tone adopted by the researchers. They suggest there are significantly higher hurdles for an attacker to surmount than originally thought.

watchTowr remains insistent that its PoC works as first described, however. ®

Send us news
3 Comments

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Wallbleed vulnerability unearths secrets of China's Great Firewall 125 bytes at a time

Boffins poked around inside censorship engines – here's what they found

Critical flaws in Mongoose library expose MongoDB to data thieves, code execution

Bugs fixed, updating to the latest version is advisable

MITRE Caldera security suite scores perfect 10 for insecurity

Is a trivial remote-code execution hole in every version part of the training, or?

FreSSH bugs undiscovered for years threaten OpenSSH security

Exploit code now available for MitM and DoS attacks

Cybersecurity not the hiring-'em-like-hotcakes role it once was

Ghost positions, HR AI no help – biz should talk to infosec staff and create 'realistic' job outline, say experts

Critical PostgreSQL bug tied to zero-day attack on US Treasury

High-complexity bug unearthed by infoseccers, as Rapid7 probes exploit further

Rather than add a backdoor, Apple decides to kill iCloud encryption for UK peeps

Plus: SEC launches new crypto crime unit; Phishing toolkit upgraded; and more

Trump’s DoD CISO pick previously faced security clearance suspension

Hey, at least Katie Arrington brings a solid resume

Harassment allegations against DEF CON veteran detailed in court filing

More than a dozen women came forward with accusations

Palo Alto firewalls under attack as miscreants chain flaws for root access

If you want to avoid urgent patches, stop exposing management consoles to the public internet

Polish space agency confirms cyberattack

Officials vow to uncover who was behind it