{"id":24720,"date":"2022-06-02T02:47:07","date_gmt":"2022-06-02T00:47:07","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=24720"},"modified":"2022-06-03T18:33:41","modified_gmt":"2022-06-03T16:33:41","slug":"searchnightmare-windows-10-search-ms-uri-handler-0-day-exploit-mit-office-2019","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/06\/02\/searchnightmare-windows-10-search-ms-uri-handler-0-day-exploit-mit-office-2019\/","title":{"rendered":"SearchNightmare: Windows 10 search-ms: URI Handler 0-day Exploit with Office 2019"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2022\/06\/02\/searchnightmare-windows-10-search-ms-uri-handler-0-day-exploit-mit-office-2019\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Following the discovery of the Follina vulnerability exploit (CVE-2022-30190) via the Windows ms-msdt protocol, this bastion is being \"stormed\". A hacker looked at the search-ms: URI handler in Windows 10 and developed an exploit similar to Follina. With the help of Office 2019, he can open Windows Search via the protocol handler. Colleagues at Bleeping Computer have already coined the term SearchNightmare for this 0-day exploit.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/d8c668b5948b498b8dde74386403ae2e\" alt=\"\" width=\"1\" height=\"1\" \/><\/p>\n<p>On Facebook, I was alerted to the following <a href=\"https:\/\/twitter.com\/hackerfantastic\/status\/1531809205887328256\" target=\"_blank\" rel=\"noopener\">tweet<\/a> from hackerfantastic.crypto in a private message. He was able to call the search-ms: URI handler on Windows 10 using Microsoft Office 2019 to gain SYSTEM privileges.<\/p>\n<p><a href=\"https:\/\/twitter.com\/hackerfantastic\/status\/1531809205887328256\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Abusing of search-ms URI handler with 0-day exploit\" src=\"https:\/\/i.imgur.com\/yCXSBmD.png\" alt=\"Abusing of search-ms URI handler with 0-day exploit\" \/><\/a><\/p>\n<p>The new zero-day vulnerability in Windows Search can be used to automatically open a search window where remote malware can be executed by launching a Word document. This is effectively a similar attack to one via the Windows ms-msdt protocol (Follina vulnerability CVE-2022-30190). This is because Matthew Hickey has used a modified exploit that chains the Microsoft Office OLEObject vulnerability to the Windows search-ms protocol handler.<\/p>\n<p>The search-ms URI protocol handler allows applications and HTML links to launch custom searches on a device. Thus, the exploit can be used to open the Windows search window or list files on remote shares by opening a Word document. The colleagues from Bleeping Computer point out <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-windows-search-zero-day-added-to-microsoft-protocol-nightmare\/\" target=\"_blank\" rel=\"noopener\">here<\/a> that external URLs can also be included in the search. This Sysinternals tools can be mounted as a network share via the following command from live.sysinternals.com to run utilities. To search this remote share and list only files that match a specific name, you could use the following \"search-ms\" URI:<\/p>\n<pre>search-ms:query=proc&amp;crumb=location:%5C%5Clive.sysinternals.com&amp;displayname=Searching%20Sysinternals<\/pre>\n<p>This works in Windows 7 SP1 up to Windows 11. An attacker could use this approach for malicious actions and, for example, link alleged security updates via search-ms-URI in phishing emails. The links could then be used to set up a remote Windows share to host malware disguised as security updates.<\/p>\n<p>Threat actors can use this method to create sophisticated phishing campaigns. The campaigns involve hosting Windows shares publicly. Then the malware could be spread remotely through the Windows search windows opened by phishing attacks\/malicious Word documents. Although the user would then have to click the link and confirm the displayed warning when opening the search (see the image in the following tweet).<\/p>\n<p><img decoding=\"async\" title=\"Mitigation of search-ms URI handler 0-day exploits\" src=\"https:\/\/i.imgur.com\/fgCXItH.png\" alt=\"Mitigation of search-ms URI handler 0-day exploits\" \/><\/p>\n<p>The hacker gives his steps to mitigate the attack path in the following tweet:<\/p>\n<p>1. run the command prompt as an administrator.<br \/>\n2. to back up the registry key, run the command \"reg export HKEY_CLASSES_ROOT\\search-ms filename\".<br \/>\n3. run the command \"reg delete HKEY_CLASSES_ROOT\\search-ms \/f\".<\/p>\n<p>The sequence of steps remove the entry for the search-ms URI protocol trader from the registry. As also addressed in the post <a href=\"https:\/\/borncity.com\/win\/2022\/06\/01\/follina-attack-via-word-documents-and-ms-msdt-protocol-cve-2022-30190\/\">Follina: Attack via Word documents and ms-msdt protocol (CVE-2022-30190)<\/a>, removing the key is not enough to fix the vulnerability. The protocol handler could still be entered in other registry branches (HKCU, HKLM).<\/p>\n<p>The text here is a quick sum up and description. Analysis and mitigation of the vulnerability by security researchers will reveal some more findings. The colleagues at Bleeping Computer have published some information about it here. Benjamin Altpeter from TU-Braunschweig already described the two vulnerabilities with ms-msdt protocol and in the search-m URI handler in 2020 in <a href=\"https:\/\/benjamin-altpeter.de\/doc\/thesis-electron.pdf\" target=\"_blank\" rel=\"noopener\">his dissertation<\/a> on Elektron application security.<\/p>\n<p><strong>Similar articles<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2022\/06\/01\/follina-attack-via-word-documents-and-ms-msdt-protocol-cve-2022-30190\/\">Follina: Attack via Word documents and ms-msdt protocol (CVE-2022-30190)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/06\/01\/follina-schwachstelle-cve-2022-30190-warnungen-erste-angriffe-der-status\/\">Follina vulnerabilitiy (CVE-2022-30190): Status, Findings, Warnings &amp; Attacks<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/06\/02\/0patch-micro-patch-gegen-follina-schwachstelle-cve-2022-30190-in-windows\/\">0Patch Micro patch against Follina vulnerability (CVE-2022-30190) in Windows<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Following the discovery of the Follina vulnerability exploit (CVE-2022-30190) via the Windows ms-msdt protocol, this bastion is being \"stormed\". A hacker looked at the search-ms: URI handler in Windows 10 and developed an exploit similar to Follina. With the help &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/06\/02\/searchnightmare-windows-10-search-ms-uri-handler-0-day-exploit-mit-office-2019\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,580,2],"tags":[125,69,194],"class_list":["post-24720","post","type-post","status-publish","format-standard","hentry","category-office","category-security","category-windows","tag-office","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=24720"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24720\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=24720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=24720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=24720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}