Miggo Logo

CVE-2024-29187:
WiX based installers are vulnerable to binary hijack when run as SYSTEM

7.3

CVSS Score

Basic Information

EPSS Score
-
Published
3/25/2024
Updated
3/28/2024
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
wixnuget< 3.14.13.14.1
wixnuget>= 4.0.0, < 4.0.54.0.5
WixToolset.Sdknuget< 4.0.54.0.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Burn's use of C:\Windows\Temp with insecure permissions when running as SYSTEM. The key functions identified: 1) CacheEnsureBaseWorkingFolder initially created directories without proper ACLs 2) DirEnsureExists implementations without security attributes left directories vulnerable 3) CopyEngineToWorkingFolder handled the insecure file copy operations. The GitHub commit shows these functions were modified to add SDDL-based security descriptors (D:PAI(...)) when elevated, confirming they were the vulnerable points. The pre-patch versions of these functions failed to restrict access to SYSTEM/Admins only, enabling file hijacking.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *urn us*s *n unprot**t** *:\Win*ows\T*mp *ir**tory to *opy *in*ri*s *n* run t**m *rom t**r*. T*is *ir**tory is not *ntir*ly prot**t** ***inst low privil*** us*rs. ### **t*ils W**n * *un*l* runs *s SYST*M us*r, *urn us*s **tT*mpP*t*W w*i

Reasoning

T** vuln*r**ility st*ms *rom *urn's us* o* *:\Win*ows\T*mp wit* ins**ur* p*rmissions w**n runnin* *s SYST*M. T** k*y *un*tions i**nti*i**: *) ******nsur***s*Workin**ol**r initi*lly *r**t** *ir**tori*s wit*out prop*r **Ls *) *ir*nsur**xists impl*m*nt*