Do not trust this Group Policy!

Sometimes I think that starting with a hypothetical scenario can be better than immediately diving into the details of a vulnerability. This approach, in my opinion, provides crucial context for a clearer understanding, especially when the vulnerability is easy to understand but the scenario where it could apply is not. This post is about possible…

A “deep dive” in Cert Publishers Group

While writing my latest post, my attention was also drawn to the Cert Publishers group, which is associated with the Certificate service (ADCS) in an Active Directory Domain. I was wondering about the purpose of this group and what type of permissions were assigned to its members. I was also curious to understand if it…

LocalPotato HTTP edition

Microsoft addressed our LocalPotato vulnerability in the SMB scenario with CVE-2023-21746 during the January 2023 Patch Tuesday. However, the HTTP scenario remains unpatched, as per Microsoft's decision, and it is still effective on updated systems. This is clearly an edge case, but it is important to be aware of it and avoid situations that could…

From NTAuthCertificates to “Silver” Certificate

In a recent assessment, I found that a user without special privileges had the ability to make changes to the NTAuthCertificates object. This misconfiguration piqued my curiosity, as I wanted to understand how this could potentially be exploited or misused. Having write access to the NTAuthCertificates object in Windows Active Directory, which is located in…

EoP via Arbitrary File Write/Overwite in Group Policy Client “gpsvc” – CVE-2022-37955

Summary A standard domain user can exploit Arbitrary File Write/Overwrite with NT AUTHORITY\SYSTEM under certain circumstances if Group Policy “File Preference” is configured. I reported this finding to ZDI and Microsoft fixed this in CVE-2022-37955 Versions Affected Tests (April 06, 2022) were conducted on the following Active Directory setup: Domain computer: Windows 10/Windows 11 &…

Giving JuicyPotato a second chance: JuicyPotatoNG

Well, it's been a long time ago since our beloved JuicyPotato has been published. Meantime things changed and got fixed (backported also to Win10 1803/Server2016) leading to the glorious end of this tool which permitted to elevate to SYSTEM user by abusing impersonation privileges on Windows systems. With Juicy2 it was somehow possible to circumvent…

Group Policy Folder Redirection CVE-2021-26887

Two years ago (march 2020), I found this sort of "vulnerability" in Folder Redirection policy and reported it to MSRC. They acknowledged it with CVE-2021-26887 even if they did not really fix the issue ("folder redirection component interacts with the underlying NTFS file system has made this vulnerability particularly challenging to fix"). The proposed solution…

A not-so-common and stupid privilege escalation

Some time ago, I was doing a Group Policy assessment in order to check for possible misconfigurations. Apart running the well known tools, I usually take a look at the shared SYSVOL policy folder. The SYSVOL folder is accessible in read-only by all domain users & domain computers. My attention was caught at some point…

Hands off my (MS) cloud services!

Ok, this title is deliberately provocative, but the goal of this post is just to share some (as usual) "quick & dirty" tricks with all of you concerned about securing your Microsoft's O365/Exchange/AzureAD online instances. If you are facing the problem of having one or more services exposed on Microsoft cloud and want to have…