Microsoft Windows Media Player WMDRM 'RES://' URI Arbitrary Code Execution Vulnerability
该文章描述了一个影响IE核心应用程序的安全漏洞。由于'RES://' URI被错误地映射到"Internet"安全区域,带有"Mark-of-the-Web"(MOTW)的文件可通过HTML Iframes引用本地文件并注入脚本代码。攻击者可利用此漏洞绕过"Local"安全区域限制,在高权限下执行任意代码。该漏洞影响Windows 7 SP1、8.1及部分Windows 10版本中的IE v.12。 2025-12-14 22:34:17 Author: cxsecurity.com(查看原文) 阅读量:6 收藏

There´s an implementation flaw that causes 'RES://' URIs to always be mapped to an 'Internet' security zone context, which allows downloaded files containing the 'Mark-of-the-Web' (MOTW) to reference arbitrary local files in HTML 'Iframes' and further inject script code in them. Local files that do not contain a MOTW should belong to the 'Local' security zone when a particular 'FEATURECONTROL', the 'Local Machine Lockdown' is not enabled for the app hosting IE core, and therefore they should not be accessible from an 'Internet' context. What has been observed is that upon using the same 'RES://' URI referenced in the HTML 'Iframe' element, in a Modal dialog, it is possible to bypass the 'Local' security zone access block via the setting: "Web sites in less privileged web content zone can navigate into this zone" The local security zone has this setting always as "Deny", so naturally, you get an "Access denied" error. because this time the 'RES://' URI will be correctly mapped to the 'Local' security context and run script code with high privileges allowing for arbitrary code execution. Vulnerable versions: v.12 on Windows 7 SP1, 8.1, 10 LTSC 1507, 1511. x86/x64 Full exploit PoC: https://github.com/Edubr2020/WMP_WMDRM_RES_RCE/blob/main/wmp_wmdrm_res_PoC.zip Video demo: https://www.youtube.com/watch?v=QmG9_biXNTs

References:

https://github.com/Edubr2020/WMP_WMDRM_RES_RCE/blob/main/README.md




 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025120014
如有侵权请联系:admin#unsafe.sh