After installing April's updates, Windows 10 and 11 systems now have an empty C:\inetpub directory.
This seems... unexpected?
After installing April's updates, Windows 10 and 11 systems now have an empty C:\inetpub directory.
This seems... unexpected?
@wdormann since anybody can create a folder on the root on C:, that might actually be exploitable before the patch is installed
@jernej__s @wdormann that’s also an exploitable vulnerability, a standard user shouldn’t be able to stop a security update installing
@GossiTheDog @wdormann At least it looks like the update fails to apply if you create a file named inetpub in root first.
@FritzAdalis @GossiTheDog @jernej__s
If IIS is truly installed, KB5057589 installs fine.
Presumably the failed installation is due to unexpected permissions on C:\inetpub?
@GossiTheDog @jernej__s
Yeah, so this is interesting. I was skeptical, but I can confirm that KB5057589 (which installs KB5055674) for Windows 10 will fail to install if there is a C:\inetpub directory present ahead of time, which a non-admin user can fulfill.
I wouldn't expect the update to be so fragile that the mere presence of a C:\inetpub directory prevents its installation. While KB5057589 is indeed listed as a "Security Update", I can find no information of what CVE(s) it fixes. 🤔
@wdormann @GossiTheDog @jernej__s
I wonder if it'll fail to install if iis is actually present, or present but moved to another drive.
@GossiTheDog @wdormann @FritzAdalis @jernej__s There are now sites that say that you can safely delete the folder after installation of the kb.
My assumption is that the folder has been created to fix a possible vulnerability where a user can place a folder/file there to exploit a bug in another component and elevate privileges. I would leave it there.
@GossiTheDog @wdormann @FritzAdalis @jernej__s Yes it opens a new one. But does the created folder by the update still allow a user to create files in C:\inetpub or are the permissions locked down to administrators?
@GossiTheDog @wdormann @FritzAdalis I just tested, and while you can create inetpub folder without elevation, you can't create an inetpub file, so you at least can't prevent the update from installing as a regular user.
@GossiTheDog @wdormann @FritzAdalis @jernej__s
So the update fixes CVE-2025-21204 by updating folder permissions for C:\inetpub even if it was created by a user beforehand. Also a normal user can't create files in C:\ only folders.
Users that already deleted the folder should temporarily install IIS to create the folder again with correct permissions.
@GossiTheDog @faebudo @FritzAdalis @jernej__s
If I remember my testing properly, a junction to a folder does not break the update. But a weird junction to a file (which Microsoft claims is not possible) does break the April update.
Which mirrors the test that a C:\inetpub directory does not break the update but a C:\inetpub file does break things. Except that the junction variant is something a non-admin user can do.
From over at the Bad Site ™
Both the vulnerability and the "fix" for CVE-2025-21204 are quite silly.
The scenario is:
The outcome is:
The web content provided by the non-admin user (be it a web shell or whatnot) is served up by IIS.
Maybe non-admin users shouldn't be able to make directories or junctions (to directories or files) in C:\?
NAH.
Maybe installing IIS should provide a clean webroot when it's installed?
NAH.
Just preemptively make a C:\inetpub directory that non-admin users can't write to. That fixes the problem. 🤦♂️
@wdormann MSRC still haven't triaged the (I think) vuln CVE-2025-21204 patches introduces 🤪
So, apparently this is the "fix" for CVE-2025-21204. Microsoft recently updated their advisory to say what the update does.
Prior to everybody freaking out, the advisory for CVE-2025-21204 said nothing about what it does.
Two gripes:
Great job, folks.
Would changing the ACLs to not allow non-admin users the ability to create directories off of C:\ really have a real-world impact of limiting LPEs?
Absolutely. When you write a tool to look for things (e.g. Crassus), you see things. Heck, I've seen a privileged service attempt to open files in C:\Program%20Files\, which any non-admin Windows user can create by default.
But no, even despite being presented with evidence for how this could fix an entire CLASS of LPEs on Windows, MSRC was not interested.
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.