GHSA-g4v6-69p6-q3p4:
WiX Burn-based bundles are vulnerable to binary hijack when run as SYSTEM
7.3
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
-
Published
3/25/2024
Updated
3/25/2024
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
PanelSwWix4.Sdk | nuget | <= 5.0.0-psw-wix.0262-48 | 5.0.0-psw-wix.0265-49 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Burn using C:\Windows\Temp with insecure permissions when elevated. The key functions are:
- CacheEnsureBaseWorkingFolder - Directly responsible for creating working directories without proper ACLs when elevated
- CopyEngineToWorkingFolder - Handles copying sensitive binaries to these insecure locations
- DirEnsureExists calls - The mechanism that actually created the directories with weak permissions
The commit diff shows these functions were modified to add SDDL-based security descriptors (D:PAI...SY) when elevated, confirming they were the vulnerable points. The original implementation lacked these protections, allowing non-admin users to write to working directories through inherited C:\Windows\Temp permissions.