{"id":15127,"date":"2019-04-18T10:30:17","date_gmt":"2019-04-18T18:30:17","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/04\/18\/news-8876\/"},"modified":"2019-04-18T10:30:17","modified_gmt":"2019-04-18T18:30:17","slug":"news-8876","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/04\/18\/news-8876\/","title":{"rendered":"Here&#039;s an easier way to block the IE XXE zero day security hole"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/02\/rescue_diagnose_fix_patch_update_laptop_thinkstock_185931513-100749650-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 18 Apr 2019 09:57:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">The latest Internet Explorer XXE zero-day depends on you opening an infected MHT file. MHT is an old file format that\u2019s almost always opened by IE \u2014 no matter which browser you\u2019re using, no matter which version of Windows. Catalin Cimpanu has a good overview of this XXE vulnerability<\/span><a href=\"https:\/\/www.zdnet.com\/article\/internet-explorer-zero-day-lets-hackers-steal-files-from-windows-pcs\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">on ZDNet<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s a doozy of a security hole as it affects every recent version of IE, and it infects whether you\u2019re actively browsing with IE or not.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When you download files from the internet, they\u2019re marked \u2014 the \u201cMark-Of-The-Web\u201d \u2014 to tell programs that special care is required when opening them. Thus, if you download an infected MHT file, IE will know that it needs to open the MHT file with caution (at \u201clow integrity,\u201d in a sandbox). That severely limits this exploit\u2019s reach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There\u2019s a lot of controversy about how bad this XXE hole really is. There have been numerous XXE holes discovered in the past; they\u2019re used to pull files off your machine and send them to the bad guys. Microsoft figured this one isn\u2019t all that bad, in part because of the MOTW mechanism and in part because the creep has to know the name and location of the file they want to purloin. The folks who discovered this particular hole aren\u2019t so sanguine. They responded to Microsoft\u2019s snub last week by releasing details,<\/span><a href=\"http:\/\/hyp3rlinx.altervista.org\/advisories\/MICROSOFT-INTERNET-EXPLORER-v11-XML-EXTERNAL-ENTITY-INJECTION-0DAY.txt\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">proof of concept code<\/span><\/a><span style=\"font-weight: 400;\">, and even a video.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yesterday, Mitja Kolsek at 0patch<\/span><a href=\"https:\/\/blog.0patch.com\/2019\/04\/microsoft-edge-uses-secret-trick-and.html\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">revealed something disconcerting<\/span><\/a><span style=\"font-weight: 400;\">. If you use Edge to download an infected MHT file, Internet Explorer will open it like any other file. Says Kolsek:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Does Edge not put the mark-of-the-web on downloaded files, or does it do it differently and somehow confuses Internet Explorer? That would be a serious flaw.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He goes on to explain how Edge changes the permissions on downloaded files and, thus, why IE will open the infected MHT file as if it had no Mark-Of-The-Web.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s fascinating stuff if you\u2019re into this kind of thing. Ionut Ilascu has a<\/span><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-edge-file-permissions-clash-with-ie-allow-xxe-attacks\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">synopsis on BleepingComputer<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Because of this XXE zero-day, many people recommend that you disable Internet Explorer entirely. While I\u2019m very much in favor of avoiding IE at all costs, disabling it is <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4013567\/how-to-disable-internet-explorer-on-windows\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">a rather painful procedure<\/span><\/a><span style=\"font-weight: 400;\"> that could have unintended consequences. It&#8217;s far better, in my opinion, to re-wire Windows so it doesn\u2019t use IE to handle MHT files.<\/span><\/p>\n<p><em><span style=\"font-weight: 400;\">Warning: If you need to use MHT files, don\u2019t do this. <\/span><\/em><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s an easy way to disassociate Internet Explorer from MHT in Win10 (thx, <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/that-internet-explorer-xxe-zero-day-poking-through-to-edge\/#post-541656\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">MikeMc<\/span><\/a><span style=\"font-weight: 400;\">):<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Step 1: Make sure filename extensions are showing. Click on File Explorer (the icon at the bottom that looks like a file folder), then at the top click View. Make sure the box marked File name extensions is checked.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Step 2: Right-click an empty spot on your desktop and choose File &gt; New &gt; Rich Text Format (actually, any kind of file will work). Windows puts a new file of that type on your desktop, with the name already highlighted so you can change it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Step 3: Rename the file to wow.mht or anythingelse.mht. Make sure you\u2019ve deleted all of the old filename, including the part to the right of the period. Hit enter. Windows will nag you about changing file name extensions. Click Yes, thank you, Mother Microsoft.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Step 4: Right-click on the newly created mht file and click Open with\u2026. (see screenshot below).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Changing file name extensions is part of the solution to fending off the IE XXE zero-day hole in Windows.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Step 5: Click More apps, then Notepad (or some equally innocuous program), check the box marked Always use the app to open .mht files, and click OK.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Step 6: Test to make sure you\u2019ve subverted MHT files by double-clicking on your desktop MHT file.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Don\u2019t even bother trying to confirm if the change was made in the Windows Apps Settings file types pane (Start &gt; Settings &gt; Apps &gt; Choose default apps by file type &gt; mht). It\u2019s broken, and has been for years.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As usual, a simple change that\u2019s painfully obtuse and buggy in Windows 10 is very straightforward in Win7 and 8.1. Here\u2019s how:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Step 1: Click Start &gt; Control Panel &gt; Programs and under Default Programs click Make a file type always open in a specific program.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Step 2: On the left, scroll down to .mht. See how it\u2019s associated with Internet Explorer? Click on mht and click Change program\u2026 Windows shows you a pane that\u2019s marked Open with.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Step 3. On the lower right, click Browse, navigate to c:WindowsSystem32, scroll way down, click on Notepad.exe and click Open.\u00a0<\/span><span style=\"font-weight: 400;\">Click OK.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From that point on, any MHT file will open in Notepad &#8211; and the infection cycle has been broken.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Questions about the method? Hit us on the <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2019\/to-block-the-latest-zero-day-instead-of-removing-internet-explorer-just-short-circuit-access-to-mht-files\/\" rel=\"nofollow\"><i><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3390200\/heres-an-easier-way-to-block-the-ie-xxe-zero-day-security-hole.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/02\/rescue_diagnose_fix_patch_update_laptop_thinkstock_185931513-100749650-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 18 Apr 2019 09:57:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">The latest Internet Explorer XXE zero-day depends on you opening an infected MHT file. MHT is an old file format that\u2019s almost always opened by IE \u2014 no matter which browser you\u2019re using, no matter which version of Windows. Catalin Cimpanu has a good overview of this XXE vulnerability<\/span><a href=\"https:\/\/www.zdnet.com\/article\/internet-explorer-zero-day-lets-hackers-steal-files-from-windows-pcs\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">on ZDNet<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s a doozy of a security hole as it affects every recent version of IE, and it infects whether you\u2019re actively browsing with IE or not.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3390200\/heres-an-easier-way-to-block-the-ie-xxe-zero-day-security-hole.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,13764,714,10525],"class_list":["post-15127","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-pcs","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15127"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15127\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}