altSecurityIdentities attribute (explicit certificate mapping) of a domain principal can be abused to compromise its account.
Background
The configuration was first described by Géraud de Drouas in this git page, later highlighted by Jean Marsault in this blogpost, and then taggedESC14 by Jonas Bülow Knudsen in this blogpost.
Exploitation Methods
There are currently three documented methods for exploiting this vulnerability:Method 1: Overwrite altSecurityIdentities
Method 1: Overwrite altSecurityIdentities
Overwrite the
altSecurityIdentities attribute to compromise an account.- Enroll in a certificate with an attacker-controlled principal.
- Add an explicit certificate mapping from the certificate to the attribute.
- Authenticate as the target account.
Method 2: Abuse X509RFC822 Entry
Method 2: Abuse X509RFC822 Entry
Abuse an existing
X509RFC822 entry in the altSecurityIdentities attribute of a principal.- Modify the
mailattribute of an attacker-controlled principal. - Enroll in a certificate with the attacker-controlled principal.
- Authenticate as the target principal (only works against users).
Method 3: Abuse X509IssuerSubject or X509SubjectOnly Entry
Method 3: Abuse X509IssuerSubject or X509SubjectOnly Entry
Abuse an existing
X509IssuerSubject or X509SubjectOnly entry in the altSecurityIdentities attribute of a principal.- Modify the
cnordNSHostNameattribute of an attacker-controlled principal. - Enroll in a certificate with the attacker-controlled principal.
- Authenticate as the target principal.