2021-07-09 13:59:50 +01:00
# Security Policy
2023-04-20 20:28:33 +01:00
## Reporting a vulnerability
2021-07-09 13:59:50 +01:00
2023-04-20 20:42:04 +01:00
Please report any found security vulnerability directly to me at xanatosdavid[at]gmail.com or through the [Report a vulnerability ](https://github.com/sandboxie-plus/Sandboxie/security/advisories/new ) form provided by GitHub. Please describe the issue in full detail and, if possible, include a proof of concept exploit.
2023-12-03 12:49:52 +00:00
## Fixed security issues
2024-11-28 21:43:45 +00:00
### SECURITY ISSUE ID-24
2024-11-29 11:32:50 +00:00
Files stored inside a sandbox folder were accessible to all users on a system, resulting in security issues in multi-user scenarios; see [CVE-2024-49360 ](https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-4chj-3c28-gvmp )
2024-11-28 21:01:11 +00:00
fixed in: 1.15.0 / 5.70.0
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-23 (thanks Diversenok)
2023-12-04 18:19:56 +00:00
A sandboxed process with administrative privileges could enable SeManageVolumePrivilege, this allowed it to read MFT data, in case of files smaller than 1 cluster that allowed to read the file payload
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 1.12.3 / 5.67.3
2023-12-03 12:49:52 +00:00
2023-12-04 18:19:56 +00:00
### SECURITY ISSUE ID-22
2023-12-03 12:49:52 +00:00
NtCreateSectionEx was not filtered by the driver
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 1.8.0 / 5.63.0
2023-12-03 12:49:52 +00:00
2023-12-04 18:19:56 +00:00
### SECURITY ISSUE ID-21
2023-12-03 12:49:52 +00:00
AlpcConnectPortEx was not filtered by the driver
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 1.5.1 / 5.60.1
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-20
2023-12-04 18:19:56 +00:00
Sandboxed programs could read the memory of host processes, presumably this was an intentional design decision by the old developers, but it's not required and it's better for privacy not to allow this. Note: You can use ReadIpcPath=$:program.exe to allow read access to unsandboxed processes or processes in other boxes
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 1.0.16 / 5.55.16
2023-12-04 18:19:56 +00:00
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-19 [#1714](https://github.com/sandboxie-plus/Sandboxie/issues/1714)
2023-12-04 18:19:56 +00:00
NtGetNextThread was not properly filtered by the Sandboxie driver, hence a sandboxed process could obtain a handle on an unsandboxed thread with write privileges. The issue can be remedied on older Sandboxie versions by enabling EnableObjectFiltering=y
2023-12-03 13:17:44 +00:00
2023-12-03 13:30:53 +00:00
fixed in: 1.0.14 / 5.55.14
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-18 (thanks Diversenok)
NtCreateSymbolicLinkObject was not filtered
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 1.0.15 / 5.55.15
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-17 (thanks Diversenok)
Hard link creation was not properly filtered
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 1.0.13 / 5.55.13
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-16
2023-12-04 18:19:56 +00:00
When starting *COMSRV* unboxed, the returned process handle had full access
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 1.0.9 / 5.55.9
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-15 (thanks hg421)
2023-12-04 18:19:56 +00:00
The HostInjectDll mechanism allowed for local privilege escalation
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.7.2 / 5.49.0
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-14 (thanks hg421) [#552](https://github.com/sandboxie-plus/Sandboxie/issues/552)
2023-12-04 18:19:56 +00:00
"\Device\DeviceApi\CMApi" is now filtered by the driver, this allowed elevated processes to change hardware configuration
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.7.0 / 5.48.0
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-13 (thanks hg421) [#553](https://github.com/sandboxie-plus/Sandboxie/issues/553)
2023-12-04 18:19:56 +00:00
"\RPC Control\samss lpc" is now filtered by the driver, this allowed elevated processes to change passwords, delete users and alike
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.7.0 / 5.48.0
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-12 (thanks typpos) [#549](https://github.com/sandboxie-plus/Sandboxie/pull/549)
2023-12-04 18:19:56 +00:00
A race condition in the driver allowed to obtain an elevated rights handle to an unsandboxed process
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.7.0 / 5.48.0
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-11 (thanks hg421)
2023-12-04 18:19:56 +00:00
Elevated sandboxed processes could access volumes/disks for reading
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.7.0 / 5.48.0
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-10
2023-12-04 18:19:56 +00:00
The registry isolation could be bypassed, present since Windows 10 Creators Update
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.5.4d / 5.46.3
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-9
2023-12-04 18:19:56 +00:00
A sandboxed process could start sandboxed as system, even with DropAdminRights in place
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.5.4b / 5.46.1
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-8 (thanks Diversenok)
2023-12-04 18:19:56 +00:00
CVE-2019-13502 "\RPC Control\LSARPC_ENDPOINT" is now filtered by the driver, this allowed some system options to be changed
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.5.4 / 5.46.0
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-7
2023-12-04 18:19:56 +00:00
A bug in the dynamic IPC port handling allowed to bypass IPC isolation
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.5.4 / 5.46.0
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-6 (thanks Diversenok)
2023-12-04 18:19:56 +00:00
Processes could spawn processes outside the sandbox
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.5.4 / 5.46.0
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-5
2023-12-04 18:19:56 +00:00
Added print spooler filter to prevent printers from being set up outside the sandbox
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.5.4 / 5.46.0
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-4 (thanks Diversenok)
2023-12-04 18:19:56 +00:00
Sandboxie now strips particularly problematic privileges from sandboxed system tokens. With those, a process could attempt to bypass the sandbox isolation
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.5.4 / 5.46.0
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-3 (thanks Diversenok)
2023-12-04 18:19:56 +00:00
Fixed missing SCM access check for sandboxed services
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.3 / 5.42
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-2
2023-12-04 18:19:56 +00:00
Fixed permission issues with sandboxed system processes
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.3 / 5.42
2023-12-03 12:49:52 +00:00
### SECURITY ISSUE ID-1 (thanks Diversenok)
2023-12-04 18:19:56 +00:00
Sandboxed processes could obtain a write handle on non-sandboxed processes
2023-12-03 13:17:44 +00:00
2023-12-03 12:55:52 +00:00
fixed in: 0.2 / 5.41.0