githubEdit

MS-FSRVP abuse (ShadowCoerce)

Theory

MS-FSRVP is Microsoft's File Server Remote VSS Protocol. It's used for creating shadow copies of file shares on a remote computer, and for facilitating backup applications in performing application-consistent backup and restore of data on SMB2 shares (docs.microsoft.comarrow-up-right). That interface is available through the \pipe\FssagentRpc SMB named pipe.

In late 2021, Lionel GILLESarrow-up-right published slidesarrow-up-right showcasing PetitPotam and demonstrating the possibility of abusing the protocol to coerce authentications on the last two slides.

Similarly to other MS-RPC abuses, this works by using a specific method relying on remote UNC paths. In this case, at the time of writing, two methods were detected as vulnerable: IsPathSupported and IsPathShadowCopied.

The coerced authentications are made over SMB. Unlike other similar coercion methods (MS-RPRN printerbug, MS-EFSR petitpotam), I doubt MS-FSRVP abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP.

A requirement to the abuse is to have the "File Server VSS Agent Service" enabled on the target server.

circle-info

In June 2022, Microsoft patched CVE-2022-30154arrow-up-right in KB5014692arrow-up-right, which also patched this coercion attack.

Practice

NetExecarrow-up-right (Python) can be used to check if the target is vulnerable to ShadowCoerce.

Resources

Topotam's tweet: https://twitter.com/topotam77/status/1475701014204461056arrow-up-right

Topotam's slides: https://fr.slideshare.net/LionelTopotam/petit-potam-slidesrtfmossirarrow-up-right

Understand RPC better

Last updated