Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 13 submissions in the queue.

Submission Preview

Link to Story

Adobe Creative Cloud Experience makes it easier to run malware (with link to story)

Accepted submission by Anonymous Coward at 2022-04-10 04:39:54
Security

Bundled version of Node.js simplifies executing downloaded code

        Adobe Creative Cloud Experience, a service installed via the Creative Cloud installer for Windows, includes a Node.js executable that can be abused to infect and compromise a victim's PC. [theregister.com]

        Michael Taggart, a security researcher, recently demonstrated that the node.exe instance accompanying Adobe's service could be exploited by writing a simple proof-of-concept JavaScript file that spawns the Windows Calculator app.

        "I have confirmed that the node.exe packaged with the Adobe Customer Experience service can run any JavaScript you point it to," he explained to The Register.

        "So the attack chain may look like an installer or zip file that drops [a JavaScript file], or even a macro that drops JavaScript in a user-writable directory, then invokes Adobe's own node.exe for execution."

        Security researchers commenting on Taggart's finding said they'd been under the impression the bundled Node runtime would only execute files signed by Adobe, but evidently that's not the case.

        The presence of an unrestricted instance of Node.js on a system isn't as severe as a backdoor or internet-facing flaw that enables remote code execution – an attacker without some other vulnerability to exploit would need to induce the victim to download and run the script. But its availability does make it easier to mount an attack and to conceal that anyone has done so.

        "Because the JavaScript is getting invoked by path in C:\Program Files, it would be extremely difficult to detect from a monitoring/threat hunting perspective," explained Taggart, who added that he was able to get his own custom file dropper to run and execute a command-and-control agent without any warning from Windows Defender.

        In other words, the primary benefit of abusing node.exe in this way would be to run unsigned code in a way that isn't obvious to threat detection systems.

        Curiously, this is not the first time concerns have been raised about Creative Cloud Experience. An Adobe customer posting to the Adobe Support Community post in February notes, "My protection program on my PC detected the folder Adobe Creative Cloud Experience, e.g. node.exe, as security risk." The advice given is to simply ignore the warnings.

        Then there's a post from December, 2021, in which an Adobe customer inquires about Malwarebytes security software detecting a suspicious outbound connection from the node.exe instance within Creative Cloud Experience.

        The presence of node.exe in other Adobe applications like Photoshop has also elicited concern from those presented with warnings about the executable from their security applications. A discussion spanning the past three years in the forum for Acronis, a security application, suggests warnings raised over the presence of node.exe are false positives and that users should tell their apps to ignore such files.

        The Register asked Adobe whether it considers the ability to run unsigned code systems via Creative Cloud Experience's node.exe to be a problem, but we've not heard back. ®


Original Submission