The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Although this weakness can occur with any type of resource, it is frequently introduced when a product uses a directory search path to find executables or code libraries, but the path contains a directory that can be modified by an attacker, such as "/tmp" or the current working directory. In Windows-based systems, when the LoadLibrary or LoadLibraryEx function is called with a DLL name that does not contain a fully qualified path, the function follows a search order that includes two path elements that might be uncontrolled: the directory from which the program has been loaded the current working directory In some cases, the attack can be conducted remotely, such as when SMB or WebDAV network shares are used. One or more locations in that path could include the Windows drive root or its subdirectories. This often exists in Linux-based code assuming the controlled nature of the root directory (/) or its subdirectories (/etc, etc), or a code that recursively accesses the parent directory. In Windows, the drive root and some of its subdirectories have weak permissions by default, which makes them uncontrolled. In some Unix-based systems, a PATH might be created that contains an empty element, e.g. by splicing an empty variable into the PATH. This empty element can be interpreted as equivalent to the current working directory, which might be an untrusted search element. In software package management frameworks (e.g., npm, RubyGems, or PyPi), the framework may identify dependencies on third-party libraries or other packages, then consult a repository that contains the desired package. The framework may search a public repository before a private repository. This could be exploited by attackers by placing a malicious package in the public repository that has the same name as a package from the private repository. The search path might not be directly under control of the developer relying on the framework, but this search order effectively contains an untrusted element.
Threat Mapped score: 2.65
Industry: Finiancial
Threat priority: P3 - Important (Medium)
CVE: CVE-2023-25815
chain: a change in an underlying package causes the gettext function to use implicit initialization with a hard-coded path (CWE-1419) under the user-writable C:\ drive, introducing an untrusted search path element (CWE-427) that enables spoofing of messages.
CVE: CVE-2022-4826
Go-based git extension on Windows can search for and execute a malicious "..exe" in a repository because Go searches the current working directory if git.exe is not found in the PATH
CVE: CVE-2020-26284
A Static Site Generator built in Go, when running on Windows, searches the current working directory for a command, possibly allowing code execution using a malicious .exe or .bat file with the name being searched
CVE: CVE-2022-24765
Windows-based fork of git creates a ".git" folder in the C: drive, allowing local attackers to create a .git folder with a malicious config file
CVE: CVE-2019-1552
SSL package searches under "C:/usr/local" for configuration files and other critical data, but C:/usr/local might be world-writable.
CVE: CVE-2010-3402
"DLL hijacking" issue in document editor.
CVE: CVE-2010-3397
"DLL hijacking" issue in encryption software.
CVE: CVE-2010-3138
"DLL hijacking" issue in library used by multiple media players.
CVE: CVE-2010-3152
"DLL hijacking" issue in illustration program.
CVE: CVE-2010-3147
"DLL hijacking" issue in address book.
CVE: CVE-2010-3135
"DLL hijacking" issue in network monitoring software.
CVE: CVE-2010-3131
"DLL hijacking" issue in web browser.
CVE: CVE-2010-1795
"DLL hijacking" issue in music player/organizer.
CVE: CVE-2002-1576
Product uses the current working directory to find and execute a program, which allows local users to gain privileges by creating a symlink that points to a malicious version of the program.
CVE: CVE-1999-1461
Product trusts the PATH environmental variable to find and execute a program, which allows local users to obtain root access by modifying the PATH to point to a malicous version of that program.
CVE: CVE-1999-1318
Software uses a search path that includes the current working directory (.), which allows local users to gain privileges via malicious programs.
CVE: CVE-2003-0579
Admin software trusts the user-supplied -uv.install command line option to find and execute the uv.install program, which allows local users to gain privileges by providing a pathname that is under control of the user.
CVE: CVE-2000-0854
When a document is opened, the directory of that document is first used to locate DLLs , which could allow an attacker to execute arbitrary commands by inserting malicious DLLs into the same directory as the document.
CVE: CVE-2001-0943
Database trusts the PATH environment variable to find and execute programs, which allows local users to modify the PATH to point to malicious programs.
CVE: CVE-2001-0942
Database uses an environment variable to find and execute a program, which allows local users to execute arbitrary programs by changing the environment variable.
CVE: CVE-2001-0507
Server uses relative paths to find system files that will run in-process, which allows local users to gain privileges via a malicious file.
CVE: CVE-2002-2017
Product allows local users to execute arbitrary code by setting an environment variable to reference a malicious program.
CVE: CVE-1999-0690
Product includes the current directory in root's PATH variable.
CVE: CVE-2001-0912
Error during packaging causes product to include a hard-coded, non-standard directory in search path.
CVE: CVE-2001-0289
Product searches current working directory for configuration file.
CVE: CVE-2005-1705
Product searches current working directory for configuration file.
CVE: CVE-2005-1307
Product executable other program from current working directory.
CVE: CVE-2002-2040
Untrusted path.
CVE: CVE-2005-2072
Modification of trusted environment variable leads to untrusted path vulnerability.
CVE: CVE-2005-1632
Product searches /tmp for modules before other paths.
Phase | Note |
---|---|
Implementation | N/A |
Intro: The following code is from a web application that allows users access to an interface through which they can update their password on the system. In this environment, user passwords can be managed using the Network Information System (NIS), which is commonly used on UNIX systems. When performing NIS updates, part of the process for updating passwords is to run a make command in the /var/yp directory. Performing NIS updates requires extra privileges.
Body: The problem here is that the program does not specify an absolute path for make and does not clean its environment prior to executing the call to Runtime.exec(). If an attacker can modify the $PATH variable to point to a malicious binary called make and cause the program to be executed in their environment, then the malicious binary will be loaded instead of the one intended. Because of the nature of the application, it runs with the privileges necessary to perform system operations, which means the attacker's make will now be run with these privileges, possibly giving the attacker complete control of the system.
... System.Runtime.getRuntime().exec("make"); ...
Intro: In versions of Go prior to v1.19, the LookPath function would follow the conventions of the runtime OS and look for a program in the directiories listed in the current path [REF-1325].
Body: Therefore, Go would prioritize searching the current directory when the provided command name does not contain a directory separator and continued to search for programs even when the specified program name is empty.
func ExecuteGitCommand(name string, arg []string) error { c := exec.Command(name, arg...) var err error c.Path, err = exec.LookPath(name) if err != nil { return err } }
Intro: In February 2021 [REF-1169], a researcher was able to demonstrate the ability to breach major technology companies by using "dependency confusion" where the companies would download and execute untrusted packages.
Body: The researcher discovered the names of some internal, private packages by looking at dependency lists in public source code, such as package.json. The researcher then created new, untrusted packages with the same name as the internal packages, then uploaded them to package hosting services. These services included the npm registry for Node, PyPi for Python, and RubyGems. In affected companies, their dependency resolution would search the public hosting services first before consulting their internal service, causing the untrusted packages to be automatically downloaded and executed.