CVE-2020-9497: Improper input validation of RDP static virtual channels
Severity: | Low |
CVSS v3.1 base score: | 1.8 |
CVSS v3.1 vector: |
Software affected
Glyptodon Enterprise 1.12 and older
Glyptodon Enterprise 2.0
Description
Apache Guacamole 1.1.0 and older do not properly validate data received from RDP servers via static virtual channels. If a user connects to a malicious or compromised RDP server, specially-crafted PDUs could result in disclosure of information within the memory of the guacd process handling the connection.
Preconditions for exploitation
Sufficient privileges to compromise an RDP server, replacing its standard RDP service with a malicious service.
A Guacamole user account that has been granted access to that RDP server by the Guacamole administrator.
Results of a successful attack
Non-directable access to information otherwise only available to the Guacamole administrator (information within the memory of guacd).
Mitigation
Both Glyptodon Enterprise 1.x and 2.x have been patched with respect to this vulnerability. Users should evaluate their exposure/risk based on this advisory and plan to upgrade when possible.
Analysis and CVSS score breakdown
Metric | Value | Comments |
---|---|---|
Attack Vector | Local | Exploiting this vulnerability relies on two factors: (1) a compromised or malicious RDP server and (2) a deployment of Apache Guacamole which has been configured by an administrator to connect to that RDP server. Exploiting this vulnerability thus requires a local user account on the RDP server in question. |
Attack Complexity | High | Exploiting this vulnerability requires the attacker to first compromise an RDP server to which Apache Guacamole has been configured to connect by an administrator. |
Privileges Required | High | Exploiting this vulnerability relies on two factors: (1) a compromised or malicious RDP server and (2) a deployment of Apache Guacamole which has been configured by an administrator to connect to that RDP server. Exploiting this vulnerability thus requires a local user account on the RDP server in question with sufficient privileges to replace the standard RDP service with a malicious or compromised service. |
User Interaction | None | An attacker would require no additional user interaction beyond their own. |
Scope | Unchanged | The information disclosed via a successful attack is limited to the information already accessible to the guacd process. |
Confidentiality Impact | Low | The information disclosed via a successful attack is limited to the information within the memory of the guacd process and cannot be specifically targeted. The attacker does not have control over what information is obtained. |
Integrity | None | No modification of data is possible through exploiting this vulnerability. |
Availability | None | Each new connection runs within its own, dedicated child process of guacd. It is possible for an attempt to exploit this vulnerability to cause a crash of that child process (to cause the connection to the compromised/malicious RDP server to disconnect), however the impact is limited to the individual connection being serviced by that process. |
Exploitability | Functional exploit exists | One of the original reporters of the vulnerability has published examples describing how a vulnerable deployment can be exploited. |
Remediation Level | Official fix available | The upstream Apache Guacamole project has released a fix via their 1.2.0 release, and this fix has been backported to all affected versions of Glyptodon Enterprise. |
Report Confidence | Confirmed | Existence of the vulnerability in Apache Guacamole 1.1.0 and older has been acknowledged by the upstream Apache Guacamole project. |
Last updated