CVE-2020-9497: Improper input validation of RDP static virtual channels

Severity:

Low

CVSS v3.1 base score:

1.8

CVSS v3.1 vector:

Software affected

  • Glyptodon Enterprise 1.12 and older

  • Glyptodon Enterprise 2.0

Description

Apache Guacamole 1.1.0 and older do not properly validate data received from RDP servers via static virtual channels. If a user connects to a malicious or compromised RDP server, specially-crafted PDUs could result in disclosure of information within the memory of the guacd process handling the connection.

Preconditions for exploitation

  • Sufficient privileges to compromise an RDP server, replacing its standard RDP service with a malicious service.

  • A Guacamole user account that has been granted access to that RDP server by the Guacamole administrator.

Results of a successful attack

  • Non-directable access to information otherwise only available to the Guacamole administrator (information within the memory of guacd).

Mitigation

Both Glyptodon Enterprise 1.x and 2.x have been patched with respect to this vulnerability. Users should evaluate their exposure/risk based on this advisory and plan to upgrade when possible.

Analysis and CVSS score breakdown

MetricValueComments

Attack Vector

Local

Exploiting this vulnerability relies on two factors: (1) a compromised or malicious RDP server and (2) a deployment of Apache Guacamole which has been configured by an administrator to connect to that RDP server. Exploiting this vulnerability thus requires a local user account on the RDP server in question.

Attack Complexity

High

Exploiting this vulnerability requires the attacker to first compromise an RDP server to which Apache Guacamole has been configured to connect by an administrator.

Privileges Required

High

Exploiting this vulnerability relies on two factors: (1) a compromised or malicious RDP server and (2) a deployment of Apache Guacamole which has been configured by an administrator to connect to that RDP server. Exploiting this vulnerability thus requires a local user account on the RDP server in question with sufficient privileges to replace the standard RDP service with a malicious or compromised service.

User Interaction

None

An attacker would require no additional user interaction beyond their own.

Scope

Unchanged

The information disclosed via a successful attack is limited to the information already accessible to the guacd process.

Confidentiality Impact

Low

The information disclosed via a successful attack is limited to the information within the memory of the guacd process and cannot be specifically targeted. The attacker does not have control over what information is obtained.

Integrity

None

No modification of data is possible through exploiting this vulnerability.

Availability

None

Each new connection runs within its own, dedicated child process of guacd. It is possible for an attempt to exploit this vulnerability to cause a crash of that child process (to cause the connection to the compromised/malicious RDP server to disconnect), however the impact is limited to the individual connection being serviced by that process.

Exploitability

Functional exploit exists

One of the original reporters of the vulnerability has published examples describing how a vulnerable deployment can be exploited.

Remediation Level

Official fix available

The upstream Apache Guacamole project has released a fix via their 1.2.0 release, and this fix has been backported to all affected versions of Glyptodon Enterprise.

Report Confidence

Confirmed

Existence of the vulnerability in Apache Guacamole 1.1.0 and older has been acknowledged by the upstream Apache Guacamole project.

Last updated