MS-FSRVP abuse (ShadowCoerce)

Theory

MS-FSRVP is Microsoft's File Server Remote VSS Protocol. It's used for creating shadow copies of file shares on a remote computer, and for facilitating backup applications in performing application-consistent backup and restore of data on SMB2 shares (docs.microsoft.comarrow-up-right). That interface is available through the \pipe\FssagentRpc SMB named pipe.

In late 2021, Lionel GILLESarrow-up-right published slidesarrow-up-right showcasing PetitPotam and demonstrating the possibility of abusing the protocol to coerce authentications on the last two slides.

Similarly to other MS-RPC abuses, this works by using a specific method relying on remote UNC paths. In this case, at the time of writing, two methods were detected as vulnerable: IsPathSupported and IsPathShadowCopied.

The coerced authentications are made over SMB. Unlike other similar coercion methods (MS-RPRN printerbug, MS-EFSR petitpotam), I doubt MS-FSRVP abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP.

A requirement to the abuse is to have the "File Server VSS Agent Service" enabled on the target server.

circle-info

In June 2022, Microsoft patched CVE-2022-30154arrow-up-right in KB5014692arrow-up-right, which also patched this coercion attack.

Practice

The following Python proof-of-concept (https://github.com/ShutdownRepo/ShadowCoercearrow-up-right) implements the IsPathSupported and IsPathShadowCopied methods.

circle-check
circle-info

In my tests, the coercion needed to be attempted twice in order to work when the FssAgent hadn't been requested in a while. In short, run the command again if it doesn't work the first time.

Resources

Topotam's tweet: https://twitter.com/topotam77/status/1475701014204461056arrow-up-right

Topotam's slides: https://fr.slideshare.net/LionelTopotam/petit-potam-slidesrtfmossirarrow-up-right

Understand RPC better

Last updated

Was this helpful?