Windows-powershell / PowerShell-master /src /System.Management.Automation /security /SecuritySupport.cs
| // Copyright (c) Microsoft Corporation. | |
| // Licensed under the MIT License. | |
| using System.Collections.Generic; | |
| using System.Collections.ObjectModel; | |
| using System.Diagnostics; | |
| using System.Diagnostics.CodeAnalysis; | |
| using System.IO; | |
| using System.Globalization; | |
| using System.Management.Automation.Configuration; | |
| using System.Management.Automation.Internal; | |
| using System.Management.Automation.Security; | |
| using System.Runtime.InteropServices; | |
| using System.Security.Cryptography; | |
| using System.Security.Cryptography.X509Certificates; | |
| using System.Text; | |
| using Microsoft.PowerShell; | |
| using Microsoft.PowerShell.Commands; | |
| using DWORD = System.UInt32; | |
| namespace Microsoft.PowerShell | |
| { | |
| /// <summary> | |
| /// Defines the different Execution Policies supported by the | |
| /// PSAuthorizationManager class. | |
| /// </summary> | |
| public enum ExecutionPolicy | |
| { | |
| /// Unrestricted - No files must be signed. If a file originates from the | |
| /// internet, PowerShell provides a warning prompt to alert the user. To | |
| /// suppress this warning message, right-click on the file in File Explorer, | |
| /// select "Properties," and then "Unblock." | |
| Unrestricted = 0, | |
| /// RemoteSigned - Only .ps1 and .ps1xml files originating from the internet | |
| /// must be digitally signed. If remote, signed, and executed, PowerShell | |
| /// prompts to determine if files from the signing publisher should be | |
| /// run or not. This is the default setting. | |
| RemoteSigned = 1, | |
| /// AllSigned - All .ps1 and .ps1xml files must be digitally signed. If | |
| /// signed and executed, PowerShell prompts to determine if files from the | |
| /// signing publisher should be run or not. | |
| AllSigned = 2, | |
| /// Restricted - All .ps1 files are blocked. Ps1xml files must be digitally | |
| /// signed, and by a trusted publisher. If you haven't made a trust decision | |
| /// on the publisher yet, prompting is done as in AllSigned mode. | |
| Restricted = 3, | |
| /// Bypass - No files must be signed, and internet origin is not verified | |
| Bypass = 4, | |
| /// Undefined - Not specified at this scope | |
| Undefined = 5, | |
| /// <summary> | |
| /// Default - The most restrictive policy available. | |
| /// </summary> | |
| Default = Restricted | |
| } | |
| /// <summary> | |
| /// Defines the available configuration scopes for an execution | |
| /// policy. They are in the following priority, with successive | |
| /// elements overriding the items that precede them: | |
| /// LocalMachine -> CurrentUser -> Runspace. | |
| /// </summary> | |
| public enum ExecutionPolicyScope | |
| { | |
| /// Execution policy is retrieved from the | |
| /// PSExecutionPolicyPreference environment variable. | |
| Process = 0, | |
| /// Execution policy is retrieved from the HKEY_CURRENT_USER | |
| /// registry hive for the current ShellId. | |
| CurrentUser = 1, | |
| /// Execution policy is retrieved from the HKEY_LOCAL_MACHINE | |
| /// registry hive for the current ShellId. | |
| LocalMachine = 2, | |
| /// Execution policy is retrieved from the current user's | |
| /// group policy setting. | |
| UserPolicy = 3, | |
| /// Execution policy is retrieved from the machine-wide | |
| /// group policy setting. | |
| MachinePolicy = 4 | |
| } | |
| } | |
| namespace System.Management.Automation.Internal | |
| { | |
| /// <summary> | |
| /// The SAFER policy associated with this file. | |
| /// </summary> | |
| internal enum SaferPolicy | |
| { | |
| /// Explicitly allowed through an Allow rule | |
| ExplicitlyAllowed = 0, | |
| /// Allowed because it has not been explicitly disallowed | |
| Allowed = 1, | |
| /// Disallowed by a rule or policy. | |
| Disallowed = 2 | |
| } | |
| /// <summary> | |
| /// Security Support APIs. | |
| /// </summary> | |
| public static class SecuritySupport | |
| { | |
| internal static ExecutionPolicyScope[] ExecutionPolicyScopePreferences | |
| { | |
| get | |
| { | |
| return new ExecutionPolicyScope[] { | |
| ExecutionPolicyScope.MachinePolicy, | |
| ExecutionPolicyScope.UserPolicy, | |
| ExecutionPolicyScope.Process, | |
| ExecutionPolicyScope.CurrentUser, | |
| ExecutionPolicyScope.LocalMachine | |
| }; | |
| } | |
| } | |
| internal static void SetExecutionPolicy(ExecutionPolicyScope scope, ExecutionPolicy policy, string shellId) | |
| { | |
| throw new PlatformNotSupportedException(); | |
| string executionPolicy = "Restricted"; | |
| switch (policy) | |
| { | |
| case ExecutionPolicy.Restricted: | |
| executionPolicy = "Restricted"; | |
| break; | |
| case ExecutionPolicy.AllSigned: | |
| executionPolicy = "AllSigned"; | |
| break; | |
| case ExecutionPolicy.RemoteSigned: | |
| executionPolicy = "RemoteSigned"; | |
| break; | |
| case ExecutionPolicy.Unrestricted: | |
| executionPolicy = "Unrestricted"; | |
| break; | |
| case ExecutionPolicy.Bypass: | |
| executionPolicy = "Bypass"; | |
| break; | |
| } | |
| // Set the execution policy | |
| switch (scope) | |
| { | |
| case ExecutionPolicyScope.Process: | |
| if (policy == ExecutionPolicy.Undefined) | |
| executionPolicy = null; | |
| Environment.SetEnvironmentVariable("PSExecutionPolicyPreference", executionPolicy); | |
| break; | |
| case ExecutionPolicyScope.CurrentUser: | |
| // They want to remove it | |
| if (policy == ExecutionPolicy.Undefined) | |
| { | |
| PowerShellConfig.Instance.RemoveExecutionPolicy(ConfigScope.CurrentUser, shellId); | |
| } | |
| else | |
| { | |
| PowerShellConfig.Instance.SetExecutionPolicy(ConfigScope.CurrentUser, shellId, executionPolicy); | |
| } | |
| break; | |
| case ExecutionPolicyScope.LocalMachine: | |
| // They want to remove it | |
| if (policy == ExecutionPolicy.Undefined) | |
| { | |
| PowerShellConfig.Instance.RemoveExecutionPolicy(ConfigScope.AllUsers, shellId); | |
| } | |
| else | |
| { | |
| PowerShellConfig.Instance.SetExecutionPolicy(ConfigScope.AllUsers, shellId, executionPolicy); | |
| } | |
| break; | |
| } | |
| } | |
| internal static ExecutionPolicy GetExecutionPolicy(string shellId) | |
| { | |
| foreach (ExecutionPolicyScope scope in ExecutionPolicyScopePreferences) | |
| { | |
| ExecutionPolicy policy = GetExecutionPolicy(shellId, scope); | |
| if (policy != ExecutionPolicy.Undefined) | |
| return policy; | |
| } | |
| return ExecutionPolicy.Restricted; | |
| } | |
| private static bool? _hasGpScriptParent; | |
| /// <summary> | |
| /// A value indicating that the current process was launched by GPScript.exe | |
| /// Used to determine execution policy when group policies are in effect. | |
| /// </summary> | |
| /// <remarks> | |
| /// This is somewhat expensive to determine and does not change within the lifetime of the current process | |
| /// </remarks> | |
| private static bool HasGpScriptParent | |
| { | |
| get | |
| { | |
| if (!_hasGpScriptParent.HasValue) | |
| { | |
| _hasGpScriptParent = IsCurrentProcessLaunchedByGpScript(); | |
| } | |
| return _hasGpScriptParent.Value; | |
| } | |
| } | |
| private static bool IsCurrentProcessLaunchedByGpScript() | |
| { | |
| Process currentProcess = Process.GetCurrentProcess(); | |
| string gpScriptPath = IO.Path.Combine( | |
| Environment.GetFolderPath(Environment.SpecialFolder.System), | |
| "gpscript.exe"); | |
| bool foundGpScriptParent = false; | |
| try | |
| { | |
| while (currentProcess != null) | |
| { | |
| if (string.Equals(gpScriptPath, | |
| currentProcess.MainModule.FileName, StringComparison.OrdinalIgnoreCase)) | |
| { | |
| foundGpScriptParent = true; | |
| break; | |
| } | |
| else | |
| { | |
| currentProcess = PsUtils.GetParentProcess(currentProcess); | |
| } | |
| } | |
| } | |
| catch (System.ComponentModel.Win32Exception) | |
| { | |
| // If you attempt to retrieve the MainModule of a 64-bit process | |
| // from a WOW64 (32-bit) process, the Win32 API has a fatal | |
| // flaw that causes this to return the error: | |
| // "Only part of a ReadProcessMemory or WriteProcessMemory | |
| // request was completed." | |
| // In this case, we just catch the exception and eat it. | |
| // The implication is that logon / logoff scripts that somehow | |
| // launch the Wow64 version of PowerShell will be subject | |
| // to the execution policy deployed by Group Policy (where | |
| // our goal here is to not have the Group Policy execution policy | |
| // affect logon / logoff scripts. | |
| } | |
| return foundGpScriptParent; | |
| } | |
| internal static ExecutionPolicy GetExecutionPolicy(string shellId, ExecutionPolicyScope scope) | |
| { | |
| return ExecutionPolicy.Unrestricted; | |
| switch (scope) | |
| { | |
| case ExecutionPolicyScope.Process: | |
| { | |
| string policy = Environment.GetEnvironmentVariable("PSExecutionPolicyPreference"); | |
| if (!string.IsNullOrEmpty(policy)) | |
| return ParseExecutionPolicy(policy); | |
| else | |
| return ExecutionPolicy.Undefined; | |
| } | |
| case ExecutionPolicyScope.CurrentUser: | |
| case ExecutionPolicyScope.LocalMachine: | |
| { | |
| string policy = GetLocalPreferenceValue(shellId, scope); | |
| if (!string.IsNullOrEmpty(policy)) | |
| return ParseExecutionPolicy(policy); | |
| else | |
| return ExecutionPolicy.Undefined; | |
| } | |
| // TODO: Group Policy is only supported on Full systems, but !LINUX && CORECLR | |
| // will run there as well, so I don't think we should remove it. | |
| case ExecutionPolicyScope.UserPolicy: | |
| case ExecutionPolicyScope.MachinePolicy: | |
| { | |
| string groupPolicyPreference = GetGroupPolicyValue(shellId, scope); | |
| // Be sure we aren't being called by Group Policy | |
| // itself. A group policy should never block a logon / | |
| // logoff script. | |
| if (string.IsNullOrEmpty(groupPolicyPreference) || HasGpScriptParent) | |
| { | |
| return ExecutionPolicy.Undefined; | |
| } | |
| return ParseExecutionPolicy(groupPolicyPreference); | |
| } | |
| } | |
| return ExecutionPolicy.Restricted; | |
| } | |
| internal static ExecutionPolicy ParseExecutionPolicy(string policy) | |
| { | |
| if (string.Equals(policy, "Bypass", | |
| StringComparison.OrdinalIgnoreCase)) | |
| { | |
| return ExecutionPolicy.Bypass; | |
| } | |
| else if (string.Equals(policy, "Unrestricted", | |
| StringComparison.OrdinalIgnoreCase)) | |
| { | |
| return ExecutionPolicy.Unrestricted; | |
| } | |
| else if (string.Equals(policy, "RemoteSigned", | |
| StringComparison.OrdinalIgnoreCase)) | |
| { | |
| return ExecutionPolicy.RemoteSigned; | |
| } | |
| else if (string.Equals(policy, "AllSigned", | |
| StringComparison.OrdinalIgnoreCase)) | |
| { | |
| return ExecutionPolicy.AllSigned; | |
| } | |
| else if (string.Equals(policy, "Restricted", | |
| StringComparison.OrdinalIgnoreCase)) | |
| { | |
| return ExecutionPolicy.Restricted; | |
| } | |
| else | |
| { | |
| return ExecutionPolicy.Default; | |
| } | |
| } | |
| internal static string GetExecutionPolicy(ExecutionPolicy policy) | |
| { | |
| switch (policy) | |
| { | |
| case ExecutionPolicy.Bypass: | |
| return "Bypass"; | |
| case ExecutionPolicy.Unrestricted: | |
| return "Unrestricted"; | |
| case ExecutionPolicy.RemoteSigned: | |
| return "RemoteSigned"; | |
| case ExecutionPolicy.AllSigned: | |
| return "AllSigned"; | |
| case ExecutionPolicy.Restricted: | |
| return "Restricted"; | |
| default: | |
| return "Restricted"; | |
| } | |
| } | |
| /// <summary> | |
| /// Returns true if file has product binary signature. | |
| /// </summary> | |
| /// <param name="file">Name of file to check.</param> | |
| /// <returns>True when file has product binary signature.</returns> | |
| public static bool IsProductBinary(string file) | |
| { | |
| if (string.IsNullOrEmpty(file) || (!IO.File.Exists(file))) | |
| { | |
| return false; | |
| } | |
| // Check if it is in the product folder, if not, skip checking the catalog | |
| // and any other checks. | |
| var isUnderProductFolder = Utils.IsUnderProductFolder(file); | |
| if (!isUnderProductFolder) | |
| { | |
| return false; | |
| } | |
| // There is no signature support on non-Windows platforms (yet), when | |
| // execution reaches here, we are sure the file is under product folder | |
| return true; | |
| // Check the file signature | |
| Signature fileSignature = SignatureHelper.GetSignature(file, null); | |
| if ((fileSignature != null) && (fileSignature.IsOSBinary)) | |
| { | |
| return true; | |
| } | |
| // WTGetSignatureInfo, via Microsoft.Security.Extensions, is used to verify catalog signature. | |
| // On Win7, catalog API is not available. | |
| // On OneCore SKUs like NanoServer/IoT, the API has a bug that makes it not able to find the | |
| // corresponding catalog file for a given product file, so it doesn't work properly. | |
| // In these cases, we just trust the 'isUnderProductFolder' check. | |
| if (Signature.CatalogApiAvailable.HasValue && !Signature.CatalogApiAvailable.Value) | |
| { | |
| // When execution reaches here, we are sure the file is under product folder | |
| return true; | |
| } | |
| return false; | |
| } | |
| /// <summary> | |
| /// Returns the value of the Execution Policy as retrieved | |
| /// from group policy. | |
| /// </summary> | |
| /// <returns>NULL if it is not defined at this level.</returns> | |
| private static string GetGroupPolicyValue(string shellId, ExecutionPolicyScope scope) | |
| { | |
| ConfigScope[] scopeKey = null; | |
| switch (scope) | |
| { | |
| case ExecutionPolicyScope.MachinePolicy: | |
| scopeKey = Utils.SystemWideOnlyConfig; | |
| break; | |
| case ExecutionPolicyScope.UserPolicy: | |
| scopeKey = Utils.CurrentUserOnlyConfig; | |
| break; | |
| } | |
| var scriptExecutionSetting = Utils.GetPolicySetting<ScriptExecution>(scopeKey); | |
| if (scriptExecutionSetting != null) | |
| { | |
| if (scriptExecutionSetting.EnableScripts == false) | |
| { | |
| // Script execution is explicitly disabled | |
| return "Restricted"; | |
| } | |
| else if (scriptExecutionSetting.EnableScripts == true) | |
| { | |
| // Script execution is explicitly enabled | |
| return scriptExecutionSetting.ExecutionPolicy; | |
| } | |
| } | |
| return null; | |
| } | |
| /// <summary> | |
| /// Returns the value of the Execution Policy as retrieved | |
| /// from the local preference. | |
| /// </summary> | |
| /// <returns>NULL if it is not defined at this level.</returns> | |
| private static string GetLocalPreferenceValue(string shellId, ExecutionPolicyScope scope) | |
| { | |
| switch (scope) | |
| { | |
| // 1: Look up the current-user preference | |
| case ExecutionPolicyScope.CurrentUser: | |
| return PowerShellConfig.Instance.GetExecutionPolicy(ConfigScope.CurrentUser, shellId); | |
| // 2: Look up the system-wide preference | |
| case ExecutionPolicyScope.LocalMachine: | |
| return PowerShellConfig.Instance.GetExecutionPolicy(ConfigScope.AllUsers, shellId); | |
| } | |
| return null; | |
| } | |
| private static bool _saferIdentifyLevelApiSupported = true; | |
| /// <summary> | |
| /// Get the pass / fail result of calling the SAFER API. | |
| /// </summary> | |
| /// <param name="path">The path to the file in question.</param> | |
| /// <param name="handle">A file handle to the file in question, if available.</param> | |
| [] | |
| internal static SaferPolicy GetSaferPolicy(string path, SafeHandle handle) | |
| { | |
| SaferPolicy status = SaferPolicy.Allowed; | |
| if (!_saferIdentifyLevelApiSupported) | |
| { | |
| return status; | |
| } | |
| SAFER_CODE_PROPERTIES codeProperties = new SAFER_CODE_PROPERTIES(); | |
| IntPtr hAuthzLevel; | |
| // Prepare the code properties struct. | |
| codeProperties.cbSize = (uint)Marshal.SizeOf(typeof(SAFER_CODE_PROPERTIES)); | |
| codeProperties.dwCheckFlags = ( | |
| NativeConstants.SAFER_CRITERIA_IMAGEPATH | | |
| NativeConstants.SAFER_CRITERIA_IMAGEHASH | | |
| NativeConstants.SAFER_CRITERIA_AUTHENTICODE); | |
| codeProperties.ImagePath = path; | |
| if (handle != null) | |
| { | |
| codeProperties.hImageFileHandle = handle.DangerousGetHandle(); | |
| } | |
| // turn off WinVerifyTrust UI | |
| codeProperties.dwWVTUIChoice = NativeConstants.WTD_UI_NONE; | |
| // Identify the level associated with the code | |
| if (NativeMethods.SaferIdentifyLevel(1, ref codeProperties, out hAuthzLevel, NativeConstants.SRP_POLICY_SCRIPT)) | |
| { | |
| // We found an Authorization Level applicable to this application. | |
| IntPtr hRestrictedToken = IntPtr.Zero; | |
| try | |
| { | |
| if (!NativeMethods.SaferComputeTokenFromLevel( | |
| hAuthzLevel, // Safer Level | |
| IntPtr.Zero, // Test current process' token | |
| ref hRestrictedToken, // target token | |
| NativeConstants.SAFER_TOKEN_NULL_IF_EQUAL, | |
| IntPtr.Zero)) | |
| { | |
| int lastError = Marshal.GetLastWin32Error(); | |
| if ((lastError == NativeConstants.ERROR_ACCESS_DISABLED_BY_POLICY) || | |
| (lastError == NativeConstants.ERROR_ACCESS_DISABLED_NO_SAFER_UI_BY_POLICY)) | |
| { | |
| status = SaferPolicy.Disallowed; | |
| } | |
| else | |
| { | |
| throw new System.ComponentModel.Win32Exception(); | |
| } | |
| } | |
| else | |
| { | |
| if (hRestrictedToken == IntPtr.Zero) | |
| { | |
| // This is not necessarily the "fully trusted" level, | |
| // it means that the thread token is complies with the requested level | |
| status = SaferPolicy.Allowed; | |
| } | |
| else | |
| { | |
| status = SaferPolicy.Disallowed; | |
| NativeMethods.CloseHandle(hRestrictedToken); | |
| } | |
| } | |
| } | |
| finally | |
| { | |
| NativeMethods.SaferCloseLevel(hAuthzLevel); | |
| } | |
| } | |
| else | |
| { | |
| int lastError = Marshal.GetLastWin32Error(); | |
| if (lastError == NativeConstants.FUNCTION_NOT_SUPPORTED) | |
| { | |
| _saferIdentifyLevelApiSupported = false; | |
| } | |
| else | |
| { | |
| throw new System.ComponentModel.Win32Exception(lastError); | |
| } | |
| } | |
| return status; | |
| } | |
| /// <summary> | |
| /// Throw if file does not exist. | |
| /// </summary> | |
| /// <param name="filePath">Path to file.</param> | |
| /// <returns>Does not return a value.</returns> | |
| internal static void CheckIfFileExists(string filePath) | |
| { | |
| if (!File.Exists(filePath)) | |
| { | |
| throw new FileNotFoundException(filePath); | |
| } | |
| } | |
| /// <summary> | |
| /// Check to see if the specified cert is suitable to be | |
| /// used as a code signing cert. | |
| /// </summary> | |
| /// <param name="c">Certificate object.</param> | |
| /// <returns>True on success, false otherwise.</returns> | |
| internal static bool CertIsGoodForSigning(X509Certificate2 c) | |
| { | |
| if (!c.HasPrivateKey) | |
| { | |
| return false; | |
| } | |
| return CertHasOid(c, CertificateFilterInfo.CodeSigningOid); | |
| } | |
| /// <summary> | |
| /// Check to see if the specified cert is suitable to be | |
| /// used as an encryption cert for PKI encryption. Note | |
| /// that this cert doesn't require the private key. | |
| /// </summary> | |
| /// <param name="c">Certificate object.</param> | |
| /// <returns>True on success, false otherwise.</returns> | |
| internal static bool CertIsGoodForEncryption(X509Certificate2 c) | |
| { | |
| return ( | |
| CertHasOid(c, CertificateFilterInfo.DocumentEncryptionOid) && | |
| (CertHasKeyUsage(c, X509KeyUsageFlags.DataEncipherment) || | |
| CertHasKeyUsage(c, X509KeyUsageFlags.KeyEncipherment))); | |
| } | |
| /// <summary> | |
| /// Check to see if the specified cert is expiring by the time. | |
| /// </summary> | |
| /// <param name="c">Certificate object.</param> | |
| /// <param name="expiring">Certificate expire time.</param> | |
| /// <returns>True on success, false otherwise.</returns> | |
| internal static bool CertExpiresByTime(X509Certificate2 c, DateTime expiring) | |
| { | |
| return c.NotAfter < expiring; | |
| } | |
| private static bool CertHasOid(X509Certificate2 c, string oid) | |
| { | |
| foreach (var extension in c.Extensions) | |
| { | |
| if (extension is X509EnhancedKeyUsageExtension ext) | |
| { | |
| foreach (Oid ekuOid in ext.EnhancedKeyUsages) | |
| { | |
| if (ekuOid.Value == oid) | |
| { | |
| return true; | |
| } | |
| } | |
| break; | |
| } | |
| } | |
| return false; | |
| } | |
| private static bool CertHasKeyUsage(X509Certificate2 c, X509KeyUsageFlags keyUsage) | |
| { | |
| foreach (X509Extension extension in c.Extensions) | |
| { | |
| if (extension is X509KeyUsageExtension keyUsageExtension) | |
| { | |
| if ((keyUsageExtension.KeyUsages & keyUsage) == keyUsage) | |
| { | |
| return true; | |
| } | |
| break; | |
| } | |
| } | |
| return false; | |
| } | |
| /// <summary> | |
| /// Get the EKUs of a cert. | |
| /// </summary> | |
| /// <param name="cert">Certificate object.</param> | |
| /// <returns>A collection of cert eku strings.</returns> | |
| internal static Collection<string> GetCertEKU(X509Certificate2 cert) | |
| { | |
| Collection<string> ekus = new Collection<string>(); | |
| IntPtr pCert = cert.Handle; | |
| int structSize = 0; | |
| IntPtr dummy = IntPtr.Zero; | |
| if (Security.NativeMethods.CertGetEnhancedKeyUsage(pCert, 0, dummy, | |
| out structSize)) | |
| { | |
| if (structSize > 0) | |
| { | |
| IntPtr ekuBuffer = Marshal.AllocHGlobal(structSize); | |
| try | |
| { | |
| if (Security.NativeMethods.CertGetEnhancedKeyUsage(pCert, 0, | |
| ekuBuffer, | |
| out structSize)) | |
| { | |
| Security.NativeMethods.CERT_ENHKEY_USAGE ekuStruct = | |
| Marshal.PtrToStructure<Security.NativeMethods.CERT_ENHKEY_USAGE>(ekuBuffer); | |
| IntPtr ep = ekuStruct.rgpszUsageIdentifier; | |
| IntPtr ekuptr; | |
| for (int i = 0; i < ekuStruct.cUsageIdentifier; i++) | |
| { | |
| ekuptr = Marshal.ReadIntPtr(ep, i * Marshal.SizeOf(ep)); | |
| string eku = Marshal.PtrToStringAnsi(ekuptr); | |
| ekus.Add(eku); | |
| } | |
| } | |
| else | |
| { | |
| throw new System.ComponentModel.Win32Exception(Marshal.GetLastWin32Error()); | |
| } | |
| } | |
| finally | |
| { | |
| Marshal.FreeHGlobal(ekuBuffer); | |
| } | |
| } | |
| } | |
| else | |
| { | |
| throw new System.ComponentModel.Win32Exception(Marshal.GetLastWin32Error()); | |
| } | |
| return ekus; | |
| } | |
| /// <summary> | |
| /// Convert an int to a DWORD. | |
| /// </summary> | |
| /// <param name="n">Signed int number.</param> | |
| /// <returns>DWORD.</returns> | |
| internal static DWORD GetDWORDFromInt(int n) | |
| { | |
| UInt32 result = BitConverter.ToUInt32(BitConverter.GetBytes(n), 0); | |
| return (DWORD)result; | |
| } | |
| /// <summary> | |
| /// Convert a DWORD to int. | |
| /// </summary> | |
| /// <param name="n">Number.</param> | |
| /// <returns>Int.</returns> | |
| internal static int GetIntFromDWORD(DWORD n) | |
| { | |
| Int64 n64 = n - 0x100000000L; | |
| return (int)n64; | |
| } | |
| } | |
| /// <summary> | |
| /// Information used for filtering a set of certs. | |
| /// </summary> | |
| internal sealed class CertificateFilterInfo | |
| { | |
| internal CertificateFilterInfo() | |
| { | |
| } | |
| /// <summary> | |
| /// Gets or sets purpose of a certificate. | |
| /// </summary> | |
| internal CertificatePurpose Purpose | |
| { | |
| get; | |
| set; | |
| } = CertificatePurpose.NotSpecified; | |
| /// <summary> | |
| /// Gets or sets SSL Server Authentication. | |
| /// </summary> | |
| internal bool SSLServerAuthentication | |
| { | |
| get; | |
| set; | |
| } | |
| /// <summary> | |
| /// Gets or sets DNS name of a certificate. | |
| /// </summary> | |
| internal WildcardPattern DnsName | |
| { | |
| get; | |
| set; | |
| } | |
| /// <summary> | |
| /// Gets or sets EKU OID list of a certificate. | |
| /// </summary> | |
| internal List<WildcardPattern> Eku | |
| { | |
| get; | |
| set; | |
| } | |
| /// <summary> | |
| /// Gets or sets validity time for a certificate. | |
| /// </summary> | |
| internal DateTime Expiring | |
| { | |
| get; | |
| set; | |
| } = DateTime.MinValue; | |
| internal const string CodeSigningOid = "1.3.6.1.5.5.7.3.3"; | |
| internal const string OID_PKIX_KP_SERVER_AUTH = "1.3.6.1.5.5.7.3.1"; | |
| // The OID arc 1.3.6.1.4.1.311.80 is assigned to PowerShell. If we need | |
| // new OIDs, we can assign them under this branch. | |
| internal const string DocumentEncryptionOid = "1.3.6.1.4.1.311.80.1"; | |
| internal const string SubjectAlternativeNameOid = "2.5.29.17"; | |
| } | |
| } | |
| namespace Microsoft.PowerShell.Commands | |
| { | |
| /// <summary> | |
| /// Defines the valid purposes by which | |
| /// we can filter certificates. | |
| /// </summary> | |
| internal enum CertificatePurpose | |
| { | |
| /// <summary> | |
| /// Certificates where a purpose has not been specified. | |
| /// </summary> | |
| NotSpecified = 0, | |
| /// <summary> | |
| /// Certificates that can be used to sign | |
| /// code and scripts. | |
| /// </summary> | |
| CodeSigning = 0x1, | |
| /// <summary> | |
| /// Certificates that can be used to encrypt | |
| /// data. | |
| /// </summary> | |
| DocumentEncryption = 0x2, | |
| /// <summary> | |
| /// Certificates that can be used for any | |
| /// purpose. | |
| /// </summary> | |
| All = 0xffff | |
| } | |
| } | |
| namespace System.Management.Automation | |
| { | |
| using System.Management.Automation.Tracing; | |
| using System.Security.Cryptography.Pkcs; | |
| /// <summary> | |
| /// Utility class for CMS (Cryptographic Message Syntax) related operations. | |
| /// </summary> | |
| internal static class CmsUtils | |
| { | |
| internal static string Encrypt(byte[] contentBytes, CmsMessageRecipient[] recipients, SessionState sessionState, out ErrorRecord error) | |
| { | |
| error = null; | |
| if ((contentBytes == null) || (contentBytes.Length == 0)) | |
| { | |
| return string.Empty; | |
| } | |
| // After review with the crypto board, NIST_AES256_CBC is more appropriate | |
| // than .NET's default 3DES. Also, when specified, uses szOID_RSAES_OAEP for key | |
| // encryption to prevent padding attacks. | |
| const string szOID_NIST_AES256_CBC = "2.16.840.1.101.3.4.1.42"; | |
| ContentInfo content = new ContentInfo(contentBytes); | |
| EnvelopedCms cms = new EnvelopedCms(content, | |
| new AlgorithmIdentifier( | |
| Oid.FromOidValue(szOID_NIST_AES256_CBC, OidGroup.EncryptionAlgorithm))); | |
| CmsRecipientCollection recipientCollection = new CmsRecipientCollection(); | |
| foreach (CmsMessageRecipient recipient in recipients) | |
| { | |
| // Resolve the recipient, if it hasn't been done yet. | |
| if ((recipient.Certificates != null) && (recipient.Certificates.Count == 0)) | |
| { | |
| recipient.Resolve(sessionState, ResolutionPurpose.Encryption, out error); | |
| } | |
| if (error != null) | |
| { | |
| return null; | |
| } | |
| foreach (X509Certificate2 certificate in recipient.Certificates) | |
| { | |
| recipientCollection.Add(new CmsRecipient(certificate)); | |
| } | |
| } | |
| cms.Encrypt(recipientCollection); | |
| byte[] encodedBytes = cms.Encode(); | |
| string encodedContent = CmsUtils.GetAsciiArmor(encodedBytes); | |
| return encodedContent; | |
| } | |
| internal static readonly string BEGIN_CMS_SIGIL = "-----BEGIN CMS-----"; | |
| internal static readonly string END_CMS_SIGIL = "-----END CMS-----"; | |
| internal static readonly string BEGIN_CERTIFICATE_SIGIL = "-----BEGIN CERTIFICATE-----"; | |
| internal static readonly string END_CERTIFICATE_SIGIL = "-----END CERTIFICATE-----"; | |
| /// <summary> | |
| /// Adds Ascii armour to a byte stream in Base64 format. | |
| /// </summary> | |
| /// <param name="bytes">The bytes to encode.</param> | |
| internal static string GetAsciiArmor(byte[] bytes) | |
| { | |
| StringBuilder output = new StringBuilder(); | |
| output.AppendLine(BEGIN_CMS_SIGIL); | |
| string encodedString = Convert.ToBase64String(bytes, Base64FormattingOptions.InsertLineBreaks); | |
| output.AppendLine(encodedString); | |
| output.Append(END_CMS_SIGIL); | |
| return output.ToString(); | |
| } | |
| /// <summary> | |
| /// Removes Ascii armour from a byte stream. | |
| /// </summary> | |
| /// <param name="actualContent">The Ascii armored content.</param> | |
| /// <param name="beginMarker">The marker of the start of the Base64 content.</param> | |
| /// <param name="endMarker">The marker of the end of the Base64 content.</param> | |
| /// <param name="startIndex">The beginning of where the Ascii armor was detected.</param> | |
| /// <param name="endIndex">The end of where the Ascii armor was detected.</param> | |
| internal static byte[] RemoveAsciiArmor(string actualContent, string beginMarker, string endMarker, out int startIndex, out int endIndex) | |
| { | |
| byte[] messageBytes = null; | |
| startIndex = -1; | |
| endIndex = -1; | |
| startIndex = actualContent.IndexOf(beginMarker, StringComparison.OrdinalIgnoreCase); | |
| if (startIndex < 0) | |
| { | |
| return null; | |
| } | |
| endIndex = actualContent.IndexOf(endMarker, startIndex, StringComparison.OrdinalIgnoreCase) + | |
| endMarker.Length; | |
| if (endIndex < endMarker.Length) | |
| { | |
| return null; | |
| } | |
| int startContent = startIndex + beginMarker.Length; | |
| int endContent = endIndex - endMarker.Length; | |
| string encodedContent = actualContent.Substring(startContent, endContent - startContent); | |
| encodedContent = System.Text.RegularExpressions.Regex.Replace(encodedContent, "\\s", string.Empty); | |
| messageBytes = Convert.FromBase64String(encodedContent); | |
| return messageBytes; | |
| } | |
| } | |
| /// <summary> | |
| /// Represents a message recipient for the Cms cmdlets. | |
| /// </summary> | |
| public class CmsMessageRecipient | |
| { | |
| /// <summary> | |
| /// Creates an instance of the CmsMessageRecipient class. | |
| /// </summary> | |
| internal CmsMessageRecipient() { } | |
| /// <summary> | |
| /// Creates an instance of the CmsMessageRecipient class. | |
| /// </summary> | |
| /// <param name="identifier"> | |
| /// The identifier of the CmsMessageRecipient. | |
| /// Can be either: | |
| /// - The path to a file containing the certificate | |
| /// - The path to a directory containing the certificate | |
| /// - The thumbprint of the certificate, used to find the certificate in the certificate store | |
| /// - The Subject name of the recipient, used to find the certificate in the certificate store | |
| /// </param> | |
| public CmsMessageRecipient(string identifier) | |
| { | |
| _identifier = identifier; | |
| this.Certificates = new X509Certificate2Collection(); | |
| } | |
| private readonly string _identifier; | |
| /// <summary> | |
| /// Creates an instance of the CmsMessageRecipient class. | |
| /// </summary> | |
| /// <param name="certificate">The certificate to use.</param> | |
| public CmsMessageRecipient(X509Certificate2 certificate) | |
| { | |
| _pendingCertificate = certificate; | |
| this.Certificates = new X509Certificate2Collection(); | |
| } | |
| private readonly X509Certificate2 _pendingCertificate; | |
| /// <summary> | |
| /// Gets the certificate associated with this recipient. | |
| /// </summary> | |
| public X509Certificate2Collection Certificates | |
| { | |
| get; | |
| internal set; | |
| } | |
| /// <summary> | |
| /// Resolves the provided identifier into a collection of certificates. | |
| /// </summary> | |
| /// <param name="sessionState">A reference to an instance of Powershell's SessionState class.</param> | |
| /// <param name="purpose">The purpose for which this identifier is being resolved (Encryption / Decryption.</param> | |
| /// <param name="error">The error generated (if any) for this resolution.</param> | |
| public void Resolve(SessionState sessionState, ResolutionPurpose purpose, out ErrorRecord error) | |
| { | |
| error = null; | |
| // Process the certificate if that was supplied exactly | |
| if (_pendingCertificate != null) | |
| { | |
| ProcessResolvedCertificates( | |
| purpose, | |
| new X509Certificate2Collection(_pendingCertificate), | |
| out error); | |
| if ((error != null) || (Certificates.Count != 0)) | |
| { | |
| return; | |
| } | |
| } | |
| if (_identifier != null) | |
| { | |
| // First try to resolve assuming that the cert was Base64 encoded. | |
| ResolveFromBase64Encoding(purpose, out error); | |
| if ((error != null) || (Certificates.Count != 0)) | |
| { | |
| return; | |
| } | |
| // Then try to resolve by path. | |
| ResolveFromPath(sessionState, purpose, out error); | |
| if ((error != null) || (Certificates.Count != 0)) | |
| { | |
| return; | |
| } | |
| // Then by cert store | |
| ResolveFromStoreById(purpose, out error); | |
| if ((error != null) || (Certificates.Count != 0)) | |
| { | |
| return; | |
| } | |
| } | |
| // Generate an error if no cert was found (and this is an encryption attempt). | |
| // If it is only decryption, then the system will always look in the 'My' store anyways, so | |
| // don't generate an error if they used wildcards. If they did not use wildcards, | |
| // then generate an error because they were expecting something specific. | |
| if ((purpose == ResolutionPurpose.Encryption) || | |
| (!WildcardPattern.ContainsWildcardCharacters(_identifier))) | |
| { | |
| error = new ErrorRecord( | |
| new ArgumentException( | |
| string.Format(CultureInfo.InvariantCulture, | |
| SecuritySupportStrings.NoCertificateFound, _identifier)), | |
| "NoCertificateFound", ErrorCategory.ObjectNotFound, _identifier); | |
| } | |
| return; | |
| } | |
| private void ResolveFromBase64Encoding(ResolutionPurpose purpose, out ErrorRecord error) | |
| { | |
| error = null; | |
| int startIndex, endIndex; | |
| byte[] messageBytes = null; | |
| try | |
| { | |
| messageBytes = CmsUtils.RemoveAsciiArmor(_identifier, CmsUtils.BEGIN_CERTIFICATE_SIGIL, CmsUtils.END_CERTIFICATE_SIGIL, out startIndex, out endIndex); | |
| } | |
| catch (FormatException) | |
| { | |
| // Not Base-64 encoded | |
| return; | |
| } | |
| // Didn't have the sigil | |
| if (messageBytes == null) | |
| { | |
| return; | |
| } | |
| var certificatesToProcess = new X509Certificate2Collection(); | |
| try | |
| { | |
| X509Certificate2 newCertificate = new X509Certificate2(messageBytes); | |
| certificatesToProcess.Add(newCertificate); | |
| } | |
| catch (Exception) | |
| { | |
| // User call-out, catch-all OK | |
| // Wasn't certificate data | |
| return; | |
| } | |
| // Now validate the certificate | |
| ProcessResolvedCertificates(purpose, certificatesToProcess, out error); | |
| } | |
| private void ResolveFromPath(SessionState sessionState, ResolutionPurpose purpose, out ErrorRecord error) | |
| { | |
| error = null; | |
| ProviderInfo pathProvider = null; | |
| Collection<string> resolvedPaths = null; | |
| try | |
| { | |
| resolvedPaths = sessionState.Path.GetResolvedProviderPathFromPSPath(_identifier, out pathProvider); | |
| } | |
| catch (SessionStateException) | |
| { | |
| // If we got an ItemNotFound / etc., then this didn't represent a valid path. | |
| } | |
| // If we got a resolved path, try to load certs from that path. | |
| if ((resolvedPaths != null) && (resolvedPaths.Count != 0)) | |
| { | |
| // Ensure the path is from the file system provider | |
| if (!string.Equals(pathProvider.Name, "FileSystem", StringComparison.OrdinalIgnoreCase)) | |
| { | |
| error = new ErrorRecord( | |
| new ArgumentException( | |
| string.Format(CultureInfo.InvariantCulture, | |
| SecuritySupportStrings.CertificatePathMustBeFileSystemPath, _identifier)), | |
| "CertificatePathMustBeFileSystemPath", ErrorCategory.ObjectNotFound, pathProvider); | |
| return; | |
| } | |
| // If this is a directory, add all certificates in it. This will be the primary | |
| // scenario for decryption via Group Protected PFX files | |
| // (http://social.technet.microsoft.com/wiki/contents/articles/13922.certificate-pfx-export-and-import-using-ad-ds-account-protection.aspx) | |
| List<string> pathsToAdd = new List<string>(); | |
| List<string> pathsToRemove = new List<string>(); | |
| foreach (string resolvedPath in resolvedPaths) | |
| { | |
| if (System.IO.Directory.Exists(resolvedPath)) | |
| { | |
| // It would be nice to limit this to *.pfx, *.cer, etc., but | |
| // the crypto APIs support extracting certificates from arbitrary file types. | |
| pathsToAdd.AddRange(System.IO.Directory.GetFiles(resolvedPath)); | |
| pathsToRemove.Add(resolvedPath); | |
| } | |
| } | |
| // Update resolved paths | |
| foreach (string path in pathsToAdd) | |
| { | |
| resolvedPaths.Add(path); | |
| } | |
| foreach (string path in pathsToRemove) | |
| { | |
| resolvedPaths.Remove(path); | |
| } | |
| var certificatesToProcess = new X509Certificate2Collection(); | |
| foreach (string path in resolvedPaths) | |
| { | |
| X509Certificate2 certificate = null; | |
| try | |
| { | |
| certificate = new X509Certificate2(path); | |
| } | |
| catch (Exception) | |
| { | |
| // User call-out, catch-all OK | |
| continue; | |
| } | |
| certificatesToProcess.Add(certificate); | |
| } | |
| ProcessResolvedCertificates(purpose, certificatesToProcess, out error); | |
| } | |
| } | |
| private void ResolveFromStoreById(ResolutionPurpose purpose, out ErrorRecord error) | |
| { | |
| error = null; | |
| WildcardPattern subjectNamePattern = WildcardPattern.Get(_identifier, WildcardOptions.IgnoreCase); | |
| try | |
| { | |
| var certificatesToProcess = new X509Certificate2Collection(); | |
| using (var storeCU = new X509Store("my", StoreLocation.CurrentUser)) | |
| { | |
| storeCU.Open(OpenFlags.ReadOnly); | |
| X509Certificate2Collection storeCerts = storeCU.Certificates; | |
| if (Platform.IsWindows) | |
| { | |
| using (var storeLM = new X509Store("my", StoreLocation.LocalMachine)) | |
| { | |
| storeLM.Open(OpenFlags.ReadOnly); | |
| storeCerts.AddRange(storeLM.Certificates); | |
| } | |
| } | |
| certificatesToProcess.AddRange(storeCerts.Find(X509FindType.FindByThumbprint, _identifier, validOnly: false)); | |
| if (certificatesToProcess.Count == 0) | |
| { | |
| foreach (var cert in storeCerts) | |
| { | |
| if (subjectNamePattern.IsMatch(cert.Subject) || subjectNamePattern.IsMatch(cert.GetNameInfo(X509NameType.SimpleName, forIssuer: false))) | |
| { | |
| certificatesToProcess.Add(cert); | |
| } | |
| } | |
| } | |
| ProcessResolvedCertificates(purpose, certificatesToProcess, out error); | |
| } | |
| } | |
| catch (SessionStateException) | |
| { | |
| } | |
| } | |
| private void ProcessResolvedCertificates(ResolutionPurpose purpose, X509Certificate2Collection certificatesToProcess, out ErrorRecord error) | |
| { | |
| error = null; | |
| HashSet<string> processedThumbprints = new HashSet<string>(); | |
| foreach (X509Certificate2 certificate in certificatesToProcess) | |
| { | |
| if (!SecuritySupport.CertIsGoodForEncryption(certificate)) | |
| { | |
| // If they specified a specific cert, generate an error if it isn't good | |
| // for encryption. | |
| if (!WildcardPattern.ContainsWildcardCharacters(_identifier)) | |
| { | |
| error = new ErrorRecord( | |
| new ArgumentException( | |
| string.Format( | |
| CultureInfo.InvariantCulture, | |
| SecuritySupportStrings.CertificateCannotBeUsedForEncryption, | |
| certificate.Thumbprint, | |
| CertificateFilterInfo.DocumentEncryptionOid)), | |
| "CertificateCannotBeUsedForEncryption", | |
| ErrorCategory.InvalidData, | |
| certificate); | |
| return; | |
| } | |
| else | |
| { | |
| continue; | |
| } | |
| } | |
| // When decrypting, only look for certs that have the private key | |
| if (purpose == ResolutionPurpose.Decryption) | |
| { | |
| if (!certificate.HasPrivateKey) | |
| { | |
| continue; | |
| } | |
| } | |
| if (processedThumbprints.Contains(certificate.Thumbprint)) | |
| { | |
| continue; | |
| } | |
| else | |
| { | |
| processedThumbprints.Add(certificate.Thumbprint); | |
| } | |
| if (purpose == ResolutionPurpose.Encryption) | |
| { | |
| // Only let wildcards expand to one recipient. Otherwise, data | |
| // may be encrypted to the wrong person on accident. | |
| if (Certificates.Count > 0) | |
| { | |
| error = new ErrorRecord( | |
| new ArgumentException( | |
| string.Format( | |
| CultureInfo.InvariantCulture, | |
| SecuritySupportStrings.IdentifierMustReferenceSingleCertificate, | |
| _identifier, | |
| arg1: "To")), | |
| "IdentifierMustReferenceSingleCertificate", | |
| ErrorCategory.LimitsExceeded, | |
| certificatesToProcess); | |
| Certificates.Clear(); | |
| return; | |
| } | |
| } | |
| Certificates.Add(certificate); | |
| } | |
| } | |
| } | |
| /// <summary> | |
| /// Defines the purpose for resolution of a CmsMessageRecipient. | |
| /// </summary> | |
| public enum ResolutionPurpose | |
| { | |
| /// <summary> | |
| /// This message recipient is intended to be used for message encryption. | |
| /// </summary> | |
| Encryption, | |
| /// <summary> | |
| /// This message recipient is intended to be used for message decryption. | |
| /// </summary> | |
| Decryption | |
| } | |
| internal static class AmsiUtils | |
| { | |
| static AmsiUtils() | |
| { | |
| try | |
| { | |
| s_amsiInitFailed = !CheckAmsiInit(); | |
| } | |
| catch (DllNotFoundException) | |
| { | |
| PSEtwLog.LogAmsiUtilStateEvent("DllNotFoundException", $"{s_amsiContext}-{s_amsiSession}"); | |
| s_amsiInitFailed = true; | |
| return; | |
| } | |
| PSEtwLog.LogAmsiUtilStateEvent($"init-{s_amsiInitFailed}", $"{s_amsiContext}-{s_amsiSession}"); | |
| } | |
| internal static int Init() | |
| { | |
| Diagnostics.Assert(s_amsiContext == IntPtr.Zero, "Init should be called just once"); | |
| lock (s_amsiLockObject) | |
| { | |
| string appName; | |
| try | |
| { | |
| appName = string.Concat("PowerShell_", Environment.ProcessPath, "_", PSVersionInfo.ProductVersion); | |
| } | |
| catch (Exception) | |
| { | |
| // Fall back to 'Process.ProcessName' in case 'Environment.ProcessPath' throws exception. | |
| Process currentProcess = Process.GetCurrentProcess(); | |
| appName = string.Concat("PowerShell_", currentProcess.ProcessName, ".exe_", PSVersionInfo.ProductVersion); | |
| } | |
| AppDomain.CurrentDomain.ProcessExit += CurrentDomain_ProcessExit; | |
| var hr = AmsiNativeMethods.AmsiInitialize(appName, ref s_amsiContext); | |
| return hr; | |
| } | |
| } | |
| /// <summary> | |
| /// Scans a string buffer for malware using the Antimalware Scan Interface (AMSI). | |
| /// Caller is responsible for calling AmsiCloseSession when a "session" (script) | |
| /// is complete, and for calling AmsiUninitialize when the runspace is being torn down. | |
| /// </summary> | |
| /// <param name="content">The string to be scanned.</param> | |
| /// <param name="sourceMetadata">Information about the source (filename, etc.).</param> | |
| /// <returns>AMSI_RESULT_DETECTED if malware was detected in the sample.</returns> | |
| internal static AmsiNativeMethods.AMSI_RESULT ScanContent(string content, string sourceMetadata) | |
| { | |
| return AmsiNativeMethods.AMSI_RESULT.AMSI_RESULT_NOT_DETECTED; | |
| return WinScanContent(content, sourceMetadata, warmUp: false); | |
| } | |
| internal static AmsiNativeMethods.AMSI_RESULT WinScanContent( | |
| string content, | |
| string sourceMetadata, | |
| bool warmUp) | |
| { | |
| if (string.IsNullOrEmpty(sourceMetadata)) | |
| { | |
| sourceMetadata = string.Empty; | |
| } | |
| const string EICAR_STRING = "X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*"; | |
| if (InternalTestHooks.UseDebugAmsiImplementation) | |
| { | |
| if (content.Contains(EICAR_STRING, StringComparison.Ordinal)) | |
| { | |
| return AmsiNativeMethods.AMSI_RESULT.AMSI_RESULT_DETECTED; | |
| } | |
| } | |
| // If we had a previous initialization failure, just return the neutral result. | |
| if (s_amsiInitFailed) | |
| { | |
| PSEtwLog.LogAmsiUtilStateEvent("ScanContent-InitFail", $"{s_amsiContext}-{s_amsiSession}"); | |
| return AmsiNativeMethods.AMSI_RESULT.AMSI_RESULT_NOT_DETECTED; | |
| } | |
| lock (s_amsiLockObject) | |
| { | |
| if (s_amsiInitFailed) | |
| { | |
| PSEtwLog.LogAmsiUtilStateEvent("ScanContent-InitFail", $"{s_amsiContext}-{s_amsiSession}"); | |
| return AmsiNativeMethods.AMSI_RESULT.AMSI_RESULT_NOT_DETECTED; | |
| } | |
| try | |
| { | |
| if (!CheckAmsiInit()) | |
| { | |
| return AmsiNativeMethods.AMSI_RESULT.AMSI_RESULT_NOT_DETECTED; | |
| } | |
| if (warmUp) | |
| { | |
| // We are warming up the AMSI component in console startup, and that means we initialize AMSI | |
| // and create a AMSI session, but don't really scan anything. | |
| return AmsiNativeMethods.AMSI_RESULT.AMSI_RESULT_NOT_DETECTED; | |
| } | |
| AmsiNativeMethods.AMSI_RESULT result = AmsiNativeMethods.AMSI_RESULT.AMSI_RESULT_CLEAN; | |
| // Run AMSI content scan | |
| int hr; | |
| unsafe | |
| { | |
| fixed (char* buffer = content) | |
| { | |
| var buffPtr = new IntPtr(buffer); | |
| hr = AmsiNativeMethods.AmsiScanBuffer( | |
| s_amsiContext, | |
| buffPtr, | |
| (uint)(content.Length * sizeof(char)), | |
| sourceMetadata, | |
| s_amsiSession, | |
| ref result); | |
| } | |
| } | |
| if (!Utils.Succeeded(hr)) | |
| { | |
| // If we got a failure, just return the neutral result ("AMSI_RESULT_NOT_DETECTED") | |
| PSEtwLog.LogAmsiUtilStateEvent($"AmsiScanBuffer-{hr}", $"{s_amsiContext}-{s_amsiSession}"); | |
| return AmsiNativeMethods.AMSI_RESULT.AMSI_RESULT_NOT_DETECTED; | |
| } | |
| return result; | |
| } | |
| catch (DllNotFoundException) | |
| { | |
| PSEtwLog.LogAmsiUtilStateEvent("DllNotFoundException", $"{s_amsiContext}-{s_amsiSession}"); | |
| return AmsiNativeMethods.AMSI_RESULT.AMSI_RESULT_NOT_DETECTED; | |
| } | |
| } | |
| } | |
| /// <Summary> | |
| /// Reports provided content to AMSI (Antimalware Scan Interface). | |
| /// </Summary> | |
| /// <param name="name">Name of content being reported.</param> | |
| /// <param name="content">Content being reported.</param> | |
| /// <returns>True if content was successfully reported.</returns> | |
| internal static bool ReportContent( | |
| string name, | |
| string content) | |
| { | |
| return false; | |
| return WinReportContent(name, content); | |
| } | |
| private static bool WinReportContent( | |
| string name, | |
| string content) | |
| { | |
| if (string.IsNullOrEmpty(name) || | |
| string.IsNullOrEmpty(content) || | |
| s_amsiInitFailed || | |
| s_amsiNotifyFailed) | |
| { | |
| return false; | |
| } | |
| lock (s_amsiLockObject) | |
| { | |
| if (s_amsiNotifyFailed) | |
| { | |
| return false; | |
| } | |
| try | |
| { | |
| if (!CheckAmsiInit()) | |
| { | |
| return false; | |
| } | |
| int hr; | |
| AmsiNativeMethods.AMSI_RESULT result = AmsiNativeMethods.AMSI_RESULT.AMSI_RESULT_NOT_DETECTED; | |
| unsafe | |
| { | |
| fixed (char* buffer = content) | |
| { | |
| var buffPtr = new IntPtr(buffer); | |
| hr = AmsiNativeMethods.AmsiNotifyOperation( | |
| amsiContext: s_amsiContext, | |
| buffer: buffPtr, | |
| length: (uint)(content.Length * sizeof(char)), | |
| contentName: name, | |
| ref result); | |
| } | |
| } | |
| if (Utils.Succeeded(hr)) | |
| { | |
| if (result == AmsiNativeMethods.AMSI_RESULT.AMSI_RESULT_DETECTED) | |
| { | |
| // If malware is detected, throw to prevent method invoke expression from running. | |
| throw new PSSecurityException(ParserStrings.ScriptContainedMaliciousContent); | |
| } | |
| return true; | |
| } | |
| return false; | |
| } | |
| catch (DllNotFoundException) | |
| { | |
| s_amsiNotifyFailed = true; | |
| return false; | |
| } | |
| catch (System.EntryPointNotFoundException) | |
| { | |
| s_amsiNotifyFailed = true; | |
| return false; | |
| } | |
| } | |
| } | |
| private static bool CheckAmsiInit() | |
| { | |
| // Initialize AntiMalware Scan Interface, if not already initialized. | |
| // If we failed to initialize previously, just return the neutral result ("AMSI_RESULT_NOT_DETECTED") | |
| if (s_amsiContext == IntPtr.Zero) | |
| { | |
| int hr = Init(); | |
| if (!Utils.Succeeded(hr)) | |
| { | |
| return false; | |
| } | |
| } | |
| // Initialize the session, if one isn't already started. | |
| // If we failed to initialize previously, just return the neutral result ("AMSI_RESULT_NOT_DETECTED") | |
| if (s_amsiSession == IntPtr.Zero) | |
| { | |
| int hr = AmsiNativeMethods.AmsiOpenSession(s_amsiContext, ref s_amsiSession); | |
| AmsiInitialized = true; | |
| if (!Utils.Succeeded(hr)) | |
| { | |
| return false; | |
| } | |
| } | |
| return true; | |
| } | |
| internal static void CurrentDomain_ProcessExit(object sender, EventArgs e) | |
| { | |
| if (AmsiInitialized && !AmsiUninitializeCalled) | |
| { | |
| Uninitialize(); | |
| } | |
| } | |
| private static IntPtr s_amsiContext = IntPtr.Zero; | |
| private static IntPtr s_amsiSession = IntPtr.Zero; | |
| private static readonly bool s_amsiInitFailed = false; | |
| private static bool s_amsiNotifyFailed = false; | |
| private static readonly object s_amsiLockObject = new object(); | |
| /// <summary> | |
| /// Reset the AMSI session (used to track related script invocations) | |
| /// </summary> | |
| internal static void CloseSession() | |
| { | |
| WinCloseSession(); | |
| } | |
| internal static void WinCloseSession() | |
| { | |
| if (!s_amsiInitFailed) | |
| { | |
| if ((s_amsiContext != IntPtr.Zero) && (s_amsiSession != IntPtr.Zero)) | |
| { | |
| lock (s_amsiLockObject) | |
| { | |
| // Clean up the session if one was open. | |
| if ((s_amsiContext != IntPtr.Zero) && (s_amsiSession != IntPtr.Zero)) | |
| { | |
| AmsiNativeMethods.AmsiCloseSession(s_amsiContext, s_amsiSession); | |
| s_amsiSession = IntPtr.Zero; | |
| } | |
| } | |
| } | |
| } | |
| } | |
| /// <summary> | |
| /// Uninitialize the AMSI interface. | |
| /// </summary> | |
| internal static void Uninitialize() | |
| { | |
| WinUninitialize(); | |
| } | |
| internal static void WinUninitialize() | |
| { | |
| AmsiUninitializeCalled = true; | |
| if (!s_amsiInitFailed) | |
| { | |
| lock (s_amsiLockObject) | |
| { | |
| if (s_amsiContext != IntPtr.Zero) | |
| { | |
| CloseSession(); | |
| // Unregister the event handler. | |
| AppDomain.CurrentDomain.ProcessExit -= CurrentDomain_ProcessExit; | |
| // Uninitialize the AMSI interface. | |
| AmsiCleanedUp = true; | |
| AmsiNativeMethods.AmsiUninitialize(s_amsiContext); | |
| s_amsiContext = IntPtr.Zero; | |
| } | |
| } | |
| } | |
| } | |
| public static bool AmsiUninitializeCalled = false; | |
| public static bool AmsiInitialized = false; | |
| public static bool AmsiCleanedUp = false; | |
| internal static class AmsiNativeMethods | |
| { | |
| internal enum AMSI_RESULT | |
| { | |
| /// AMSI_RESULT_CLEAN -> 0 | |
| AMSI_RESULT_CLEAN = 0, | |
| /// AMSI_RESULT_NOT_DETECTED -> 1 | |
| AMSI_RESULT_NOT_DETECTED = 1, | |
| /// Certain policies set by administrator blocked this content on this machine | |
| AMSI_RESULT_BLOCKED_BY_ADMIN_BEGIN = 0x4000, | |
| AMSI_RESULT_BLOCKED_BY_ADMIN_END = 0x4fff, | |
| /// AMSI_RESULT_DETECTED -> 32768 | |
| AMSI_RESULT_DETECTED = 32768, | |
| } | |
| /// Return Type: HRESULT->LONG->int | |
| ///appName: LPCWSTR->WCHAR* | |
| ///amsiContext: HAMSICONTEXT* | |
| [] | |
| [] | |
| internal static extern int AmsiInitialize( | |
| [In][MarshalAs(UnmanagedType.LPWStr)] string appName, ref System.IntPtr amsiContext); | |
| /// Return Type: void | |
| ///amsiContext: HAMSICONTEXT->HAMSICONTEXT__* | |
| [] | |
| [] | |
| internal static extern void AmsiUninitialize(System.IntPtr amsiContext); | |
| /// Return Type: HRESULT->LONG->int | |
| ///amsiContext: HAMSICONTEXT->HAMSICONTEXT__* | |
| ///amsiSession: HAMSISESSION* | |
| [] | |
| [] | |
| internal static extern int AmsiOpenSession(System.IntPtr amsiContext, ref System.IntPtr amsiSession); | |
| /// Return Type: void | |
| ///amsiContext: HAMSICONTEXT->HAMSICONTEXT__* | |
| ///amsiSession: HAMSISESSION->HAMSISESSION__* | |
| [] | |
| [] | |
| internal static extern void AmsiCloseSession(System.IntPtr amsiContext, System.IntPtr amsiSession); | |
| /// Return Type: HRESULT->LONG->int | |
| ///amsiContext: HAMSICONTEXT->HAMSICONTEXT__* | |
| ///buffer: PVOID->void* | |
| ///length: ULONG->unsigned int | |
| ///contentName: LPCWSTR->WCHAR* | |
| ///amsiSession: HAMSISESSION->HAMSISESSION__* | |
| ///result: AMSI_RESULT* | |
| [] | |
| [] | |
| internal static extern int AmsiScanBuffer( | |
| System.IntPtr amsiContext, | |
| System.IntPtr buffer, | |
| uint length, | |
| [In][MarshalAs(UnmanagedType.LPWStr)] string contentName, | |
| System.IntPtr amsiSession, | |
| ref AMSI_RESULT result); | |
| /// Return Type: HRESULT->LONG->int | |
| /// amsiContext: HAMSICONTEXT->HAMSICONTEXT__* | |
| /// buffer: PVOID->void* | |
| /// length: ULONG->unsigned int | |
| /// contentName: LPCWSTR->WCHAR* | |
| /// result: AMSI_RESULT* | |
| [] | |
| [] | |
| internal static extern int AmsiNotifyOperation( | |
| System.IntPtr amsiContext, | |
| System.IntPtr buffer, | |
| uint length, | |
| [In][MarshalAs(UnmanagedType.LPWStr)] string contentName, | |
| ref AMSI_RESULT result); | |
| /// Return Type: HRESULT->LONG->int | |
| ///amsiContext: HAMSICONTEXT->HAMSICONTEXT__* | |
| ///string: LPCWSTR->WCHAR* | |
| ///contentName: LPCWSTR->WCHAR* | |
| ///amsiSession: HAMSISESSION->HAMSISESSION__* | |
| ///result: AMSI_RESULT* | |
| [] | |
| [] | |
| internal static extern int AmsiScanString( | |
| System.IntPtr amsiContext, [In][MarshalAs(UnmanagedType.LPWStr)] string @string, | |
| [In][MarshalAs(UnmanagedType.LPWStr)] string contentName, System.IntPtr amsiSession, ref AMSI_RESULT result); | |
| } | |
| } | |
| } | |