For a third time in four months, a security researcher announces a zero-day vulnerability in Microsoft Windows and provides exploit code that allows reading into unauthorized locations.

Known by the moniker SandboxEscaper, the researcher released details about a security vulnerability affecting ReadFile.exe, which, as its name indicates, allows reading data from specific locations.

Exploit code works

The glitch is in the "MsiAdvertiseProduct" function, which Microsoft describes as being able to generate an advertise script or advertises a product to the computer" and that it "enables the installer to write to a script the registry and shortcut information used to assign or publish a product."

Calling this function leads to an arbitrary file copy by the installer service, which is controllable by the attacker, the researcher explains.

SandboxEscaper explains that despite a check being done, the protection can be bypassed via a time to check to time to use (TOCTOU) race condition type.

The end result, she says, is the possibility to copy any files with SYSTEM privileges, with the destination being readable at all times. Because of this, she calls it an arbitrary file read vulnerability.

SandboxEscaper also makes available a video to demonstrate her findings:

The researcher says that the "easiest way to confirm the bug is to make two local accounts and read the desktop.ini of the other account."

The validity of the PoC has been confirmed today by Mitja Kolsek, CEO of Acros Security and founder of the 0Patch platform that pushes temporary fixes (micropatches) to its clients until vulnerabilities are fully addressed.

Kolsek told BleepingComputer that they hope to get a micropatch out before the holidays.

Third 0day and FBI is interested in the researcher

This is the third zero-day in Windows that SandboxEscaper releases publicly, without giving Microsoft a heads-up.

The first one was published at the end of August and allowed privilege escalation via Windows Task Scheduler

The second one was published towards the end of October and it was also a privilege escalation vulnerability. It allowed deleting without permission any files on the system.

Since publishing the first 0day in Windows, SandboxEscaper lost access to her GitHub account, where she posted bug details and proof-of-concept code. In a message on her blog, the researcher blames Microsoft directly for this.

She also managed to get the attention of the FBI, as she received a notification from Google about the agency issuing a subpoena for information release about her Google account.

The reason before FBI's move is currently unknown, but it may not be in relation to SandboxEscaper dumping Windows zero-days and exploit code into the public space. It could have something to do with a short-lived tweet from her allegedly containing a threat against the US President.

Related Articles:

Microsoft June 2024 Patch Tuesday fixes 51 flaws, 18 RCEs

PHP fixes critical RCE flaw impacting all versions for Windows

Microsoft May 2024 Patch Tuesday fixes 3 zero-days, 61 flaws

New regreSSHion OpenSSH RCE bug gives root on Linux servers

Dev rejects CVE severity, makes his GitHub repo read-only