[Isolation enhancement] Block elevated processes from manipulating local user accounts #553
Labels
Status: Fixed in Next Build
Fixed in the next Sandboxie version
Type: Bug
Something isn't working
Workaround
Temporary or alternative solution
It seems that Sandboxie fails to block sandboxed elevated processes from manipulating local user accounts.
For example, by running
net user USERNAME PASSWORD
from an elevated command prompt it is possible to set a new password for any local user account on the machine.It is also possible to modify group membership, e.g. adding/removing user accounts from the local Administrators group.
Also you can completely remove a user with
net user USERNAME /DELETE
.(Those commands really affect the "real" user account and are not isolated in the sandbox)
I think that sandboxed processes should definitely be disallowed from making such changes...
The text was updated successfully, but these errors were encountered: