Unable to protect default extraction folder ( subfolder under user Temp) of Wix installer from cut & delete operation during installation. #7771
Ambadas17jadhav
started this conversation in
WiX Development
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
We observed below behaviour by Wix installer during installation and need some help/suggestion in solving this problem.
• By default, Installer is extracting artifacts under user Temp directory –
o This directory is accessible to standard user and poses security threats like DoS if attacker delete some files during installation or Escalation of privileges if artifacts are replacing with malicious contents.
• We tried protecting extracted artifacts by creating random GUID folder as an extraction directory under user Temp and even protected it with ACLs (System: Full Control, Admin: Full Control, BuiltinUser: Read&Execute)
o Standard user still can delete/cut this newly created random GUID folder without any UAC prompt. This is very strange as normal user should not be allowed to do such operations when explicit ACLs are in place
• We removed any allowed permission for standard user to this GUID folder but then installer started throwing error related to access and contents were not getting extracted.
Is there any way to restrict cut or delete operation to this folder?
Beta Was this translation helpful? Give feedback.
All reactions