Welcome PowerShell User! This recipe is just one of the hundreds of useful resources contained in the PowerShell Cookbook.

If you own the book already, login here to get free, online, searchable access to the entire book's content.

If not, the Windows PowerShell Cookbook is available at Amazon, or any of your other favourite book retailers. If you want to see what the PowerShell Cookbook has to offer, enjoy this free 90 page e-book sample: "The Windows PowerShell Interactive Shell".

18.20 Detect and Prevent Code Injection Vulnerabilities

Problem

You have a script or function that you are exposing across a security boundary (for example, a JEA endpoint), and want to ensure that it’s not vulnerable to code injection attacks.

Solution

Install and run the InjectionHunter module from the PowerShell Gallery.

Install-Module -Name PSScriptAnalyzer -Scope CurrentUser -Force
Install-Module -Name InjectionHunter -Scope CurrentUser -Force

@'
function Set-PersonalDisplayName($DisplayName)
{
    $c = "Set-AdUser -UserPrincipalName DOMAIN\user -DisplayName $DisplayName"
    Invoke-Expression $c
}
'@ > $env:TEMP\injectable.ps1

Invoke-ScriptAnalyzer -Path $env:TEMP\injectable.ps1 `
    -CustomRulePath (Get-Module InjectionHunter -List).Path
RuleName                       ScriptName     Line Message
--------                       ----------     ---- -------
InjectionRisk.InvokeExpression injectable.ps1    4 Possible script injection risk
                                                   via the Invoke-Expression
                                                   cmdlet. Untrusted input can
                                                   cause arbitrary PowerShell
                                                   expressions to be run.
                                                   (...)

Discussion

One of the incredibly powerful things about JEA and related features is that they let you effectively reduce the number of broadly privileged administrators in your organization. When you have employees that only need to help users reset forgotten passwords, it’s a huge increase of operational risk to make them all domain administrators.

JEA lets you vastly improve this by implementing a trusted subsystem—an endpoint that approved low-privileged users can connect to, but where the actions themselves (exposed as scripts or functions that you write) are performed in a highly privileged context. This transition between low trust and high trust is known as a trust boundary, and any code you expose to the lower-trust side of the equation is called attack surface, and becomes a possible security risk.

There are several examples where PowerShell scripts can become part of an attack surface:

  • Functions or scripts that you expose in JEA endpoints

  • Helper scripts that you run as a response to administrative web UIs

  • Signed scripts that are on a system that has deployed Windows Defender Application Control

The most common cause of security vulnerabilities in PowerShell scripts that are part of a trust boundary is called script injection: where code that you write incorporates user input in an unsafe manner. This then lets the untrusted user code run in the “high trust” side of the attack surface. This class of problem shows up in every technology that involves a trust boundary in one way or another: SQL Injection, Cross-site scripting, and buffer overflows are just a few other examples.

A very simple example of this is given in the Solution, where user input gets unsafely blended into an Invoke-Expression command through the use of variable expansion:

function Set-PersonalDisplayName($DisplayName)
{
    $c = "Set-AdUser -User DOMAIN\user -DisplayName $DisplayName"
    Invoke-Expression $c
}

Invoke-Expression is PowerShell’s cmdlet to take whatever input you give it, treat it like PowerShell code, and run it. Administrators are often lucky that their scripts work at all when they use it in conjunction with user input. Let’s look at a simple example:

Set-PersonalDisplayName -DisplayName "James O'Neil"

This script runs:

Invoke-Expression "Set-AdUser -User DOMAIN\user -DisplayName James O'Neil"

which is like running this at the command line:

Set-AdUser -User DOMAIN\user -DisplayName James O'Neil

and then you start getting help desk calls from users who have the misfortune of being born with a last name that contains only an open quote and not the corresponding closing quote:

Invoke-Expression:
Line |
   4 |      Invoke-Expression $c
     |      ~~~~~~~~~~~~~~~~~~~~
     | The string is missing the terminator: '.

If an attacker is a bit more selective in their placement of special PowerShell characters, they might try something like:

PS > Set-PersonalDisplayName -DisplayName "James'' Revenge; calc"

For more information about the risks of Invoke-Expression and alternative approaches that are both easier and safer to use, see Recipe 1.2.

The Injection Hunter module from the PowerShell Gallery lets you detect this class of problems and also provides suggestions on how to write your code more securely. You can even incorporate it into Visual Studio Code to have it run while you write your scripts, as shown in Figure 18-4.

wps4 1804
Figure 18-4. Injection Hunter pointing out a script injection vulnerability

To do this, open up the PowerShell Script Analyzer settings by typing Ctrl+Comma, and then type analyzer. Under Script Analyzer Settings Path, type a path for these settings—such as alongside your profile: d:\lee\PowerShell\PSScriptAnalyzer​Settings.psd1. In it, place the following:

@{
 IncludeDefaultRules = $true
 CustomRulePath =
     "D:\Lee\WindowsPowerShell\Modules\InjectionHunter\1.0.0\InjectionHunter.psd1"
}

For the CustomRulePath setting, you can get the path to Injection Hunter by typing:

Get-Module InjectionHunter -List | ForEach-Object Path

Injection Hunter detects security issues from Invoke Expression, dangerous API usage, command injection, method and property tampering, as well as unsafe input escaping.

To learn how to write analysis rules yourself, see Recipe 10.10 to get started. With that under your belt, Injection Hunter is written as a script module. You can read the contents of InjectionHunter.psm1 to see how it implements its existing rules.

See Also

Recipe 1.2, “Run Programs, Scripts, and Existing Tools”

Recipe 10.10, “Parse and Interpret PowerShell Scripts”

Recipe 18.18, “Create a Task-Specific Remoting Endpoint”