Severity:

Low
CVSS v3.1 base score:1.8
CVSS v3.1 vector:AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C

Software affected

  • Glyptodon Enterprise 1.12 and older
  • Glyptodon Enterprise 2.0

Description

Apache Guacamole 1.1.0 and older do not properly validate data received from RDP servers via static virtual channels. If a user connects to a malicious or compromised RDP server, specially-crafted PDUs could result in disclosure of information within the memory of the guacd process handling the connection.

Preconditions for exploitation

  • Sufficient privileges to compromise an RDP server, replacing its standard RDP service with a malicious service.
  • A Guacamole user account that has been granted access to that RDP server by the Guacamole administrator.

Results of a successful attack

  • Non-directable access to information otherwise only available to the Guacamole administrator (information within the memory of guacd).

Mitigation

Both Glyptodon Enterprise 1.x and 2.x have been patched with respect to this vulnerability. Users should evaluate their exposure/risk based on this advisory and plan to upgrade when possible.

Analysis and CVSS score breakdown

MetricValueComments
Attack VectorLocalExploiting this vulnerability relies on two factors: (1) a compromised or malicious RDP server and (2) a deployment of Apache Guacamole which has been configured by an administrator to connect to that RDP server. Exploiting this vulnerability thus requires a local user account on the RDP server in question.
Attack ComplexityHighExploiting this vulnerability requires the attacker to first compromise an RDP server to which Apache Guacamole has been configured to connect by an administrator.
Privileges RequiredHighExploiting this vulnerability relies on two factors: (1) a compromised or malicious RDP server and (2) a deployment of Apache Guacamole which has been configured by an administrator to connect to that RDP server. Exploiting this vulnerability thus requires a local user account on the RDP server in question with sufficient privileges to replace the standard RDP service with a malicious or compromised service.
User InteractionNoneAn attacker would require no additional user interaction beyond their own.
ScopeUnchangedThe information disclosed via a successful attack is limited to the information already accessible to the guacd process.
Confidentiality ImpactLowThe information disclosed via a successful attack is limited to the information within the memory of the guacd process and cannot be specifically targeted. The attacker does not have control over what information is obtained.
IntegrityNoneNo modification of data is possible through exploiting this vulnerability.
AvailabilityNoneEach new connection runs within its own, dedicated child process of guacd. It is possible for an attempt to exploit this vulnerability to cause a crash of that child process (to cause the connection to the compromised/malicious RDP server to disconnect), however the impact is limited to the individual connection being serviced by that process.
ExploitabilityFunctional exploit existsOne of the original reporters of the vulnerability has published examples describing how a vulnerable deployment can be exploited.
Remediation LevelOfficial fix availableThe upstream Apache Guacamole project has released a fix via their 1.2.0 release, and this fix has been backported to all affected versions of Glyptodon Enterprise.
Report ConfidenceConfirmedExistence of the vulnerability in Apache Guacamole 1.1.0 and older has been acknowledged by the upstream Apache Guacamole project.