Miggo Logo

GHSA-g4v6-69p6-q3p4:
WiX Burn-based bundles are vulnerable to binary hijack when run as SYSTEM

7.3

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
3/25/2024
Updated
3/25/2024
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
PanelSwWix4.Sdknuget<= 5.0.0-psw-wix.0262-485.0.0-psw-wix.0265-49

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Burn using C:\Windows\Temp with insecure permissions when elevated. The key functions are:

  1. CacheEnsureBaseWorkingFolder - Directly responsible for creating working directories without proper ACLs when elevated
  2. CopyEngineToWorkingFolder - Handles copying sensitive binaries to these insecure locations
  3. DirEnsureExists calls - The mechanism that actually created the directories with weak permissions

The commit diff shows these functions were modified to add SDDL-based security descriptors (D:PAI...SY) when elevated, confirming they were the vulnerable points. The original implementation lacked these protections, allowing non-admin users to write to working directories through inherited C:\Windows\Temp permissions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

# Summ*ry *urn us*s *n unprot**t** *:\Win*ows\T*mp *ir**tory to *opy *in*ri*s *n* run t**m *rom t**r*. T*is *ir**tory is not *ntir*ly prot**t** ***inst low privil*** us*rs. # **t*ils W**n * *un*l* runs *s SYST*M us*r, *urn us*s **tT*mpP*t*W w*i**

Reasoning

T** vuln*r**ility st*ms *rom *urn usin* *:\Win*ows\T*mp wit* ins**ur* p*rmissions w**n *l*v*t**. T** k*y *un*tions *r*: *. ******nsur***s*Workin**ol**r - *ir**tly r*sponsi*l* *or *r**tin* workin* *ir**tori*s wit*out prop*r **Ls w**n *l*v*t** *. *opy*