Launch a No Elevated Process from an Elevated Process in an easy way (Win32 API)
-
@donho
Have looks at article by Raymond Chen.We already have a solution in place, but unfortunately that solution is in nsis. Look here. The idea is: Run a exe in explorer context.
MS link: https://msdn.microsoft.com/library/dd940355
MS sample: https://github.com/pauldotknopf/WindowsSDK7-Samples/tree/master/winui/shell/appplatform/ExecInExplorerHope this will help you.
-
Also below can be used as simplest solution -
ShellExecute(nullptr, L"open", L"explorer.exe", L"C:\\Program Files\\Notepad++\\Notepad++.exe", nullptr, NULL);
-
@donho said:
@dinkumoil
Indeed.@Meta-Chuh said:
possible solution:
execute runas /trustlevel:0x20000 “C:\Program Files (x86)\Notepad++\notepad++.exe”Just tried this method and seems Admin mode is OFF.
However, drag & drop a file into edit zone (which is the original motivation to run Notepad++ under user level) is forbidden just like Admin mode is ON.I will continue to search the alternative way.
Considering this scenario in mind, npp installer launches npp instance with same integrity level as explorer. Same is applicable here and drag n drop works fine using below method. So I feel, this should suit your requirement.
ShellExecute(nullptr, L"open", L"explorer.exe", L"C:\\Program Files\\Notepad++\\Notepad++.exe", nullptr, NULL);
-
@SinghRajenM said:
Also below can be used as simplest solution -
ShellExecute(nullptr, L"open", L"explorer.exe", L"C:\\Program Files\\Notepad++\\Notepad++.exe", nullptr, NULL);
Thank you for the info.
I do remember the solution you provide in NSIS and did try the line above - only explorer launched. -
The last parameter has to be 1 = SW_SHOWNORMAL
-
@donho said:
@SinghRajenM said:
Also below can be used as simplest solution -
ShellExecute(nullptr, L"open", L"explorer.exe", L"C:\\Program Files\\Notepad++\\Notepad++.exe", nullptr, NULL);
Thank you for the info.
I do remember the solution you provide in NSIS and did try the line above - only explorer launched.Interesting. It is working fine to me.
[Edit]:
@dinkumoil, nice catch. I’m usingSW_SHOW
-
thx, very cool and easy just to execute via explorer.exe, iv’e just tried it.
i didn’t know that explorer.exe does not pass the elevation level to a spawn.
so simple and perfect 👍
-
@Meta-Chuh Again it depends upon how explorer.exe is executed. In most of the cases explorer is not elevated unless user explicitly do so.
So if explorer is also elevated, then new exe also will be elevated yet. But it is expected in this case, because both will be at same integrity level which allows drag n drop.
-
@SinghRajenM
It seems your method doesn’t work only for me.
I test it in notepad++ with NO elevation, the following code launch calc well:case IDM_FILE_NEW: { //fileNew(); ShellExecute(nullptr, L"open", L"calc.exe", nullptr, nullptr, SW_SHOW); } break;
However, the following code launch only explorer:
case IDM_FILE_NEW: { //fileNew(); ShellExecute(nullptr, L"open", L"explorer.exe", L"calc.exe", nullptr, SW_SHOW); } break;
What am I missing?
-
but i don’t know that code
dism++ heve a method
toolkit > god mode
run program without right checking -
You have to provide the fully qualified path to Calc.exe/Notepad++.exe.
-
@dinkumoil said:
You have to provide the fully qualified path to Calc.exe/Notepad++.exe.
Yes I did. The following code doesn’t work neither:
case IDM_FILE_NEW: { //fileNew(); ::ShellExecuteA(NULL, "open", "explorer.exe", "C:\\sources\\notepad-plus-plus\\PowerEditor\\bin\\notepad++.exe -multiInst", "C:\\sources\\notepad-plus-plus\\PowerEditor\\bin\\", SW_SHOW); } break;
-
Hmm…
The following code works :
ShellExecute(nullptr, L"open", L"explorer.exe", L"c:\\windows\\system32\\calc.exe", nullptr, SW_SHOW);
-
@donho said:
@dinkumoil said:
You have to provide the fully qualified path to Calc.exe/Notepad++.exe.
Yes I did. The following code doesn’t work neither:
case IDM_FILE_NEW: { //fileNew(); ::ShellExecuteA(NULL, "open", "explorer.exe", "C:\\sources\\notepad-plus-plus\\PowerEditor\\bin\\notepad++.exe -multiInst", "C:\\sources\\notepad-plus-plus\\PowerEditor\\bin\\", SW_SHOW); } break;
As you know
ShellExecute
parameters,
Command/operation => “open”
Command Location/File => “explorer.exe”
Command Parameters => “C:\sources\notepad-plus-plus\PowerEditor\bin\notepad++.exe -multiInst”So here problem is command parameter which includes another command parameter. Try without “-multiInst”. It should work.
-
In case it is important for you to be able to call Notepad++ with command line arguments - I’ve implemented the algorithm from my 2nd MSDN link provided above in C and wrapped it in a small demo program.
- It can start another program with the user rights of the desktop shell process if itself is elevated.
- It can start another program with the same user rights that itself runs under if it is not elevated.
- It can start another program with parameters.
Of course, it is not an oneliner and you have to change the implementation of error handling. The GetFullPath routine is not necessary.
I compiled it with MinGW. It has to be linked against Advapi32.lib and Kernel32.lib.
#define _WIN32_WINNT 0x0501 #define WIN32_LEAN_AND_MEAN #define STRICT 1 #define _UNICODE #define UNICODE #include <sdkddkver.h> /******************************************************************************* Includes *******************************************************************************/ #include <windows.h> #include <stdlib.h> #include <stdio.h> /******************************************************************************* Prototypes *******************************************************************************/ BOOL RunAsDesktopUser (LPCWSTR szApp, LPWSTR szCmdLine, LPCWSTR szCurrDir, STARTUPINFO *si, PROCESS_INFORMATION *pi); BOOL RunLoweredProcess(LPCWSTR szApp, LPWSTR szCmdLine, LPCWSTR szCurrDir, STARTUPINFO *si, PROCESS_INFORMATION *pi); BOOL RunProcess (LPCWSTR szApp, LPWSTR szCmdLine, LPCWSTR szCurrDir, STARTUPINFO *si, PROCESS_INFORMATION *pi); BOOL SetPrivilege (HANDLE hProcessToken, LPCWSTR lpszPrivilege, BOOL bEnablePrivilege); BOOL IsElevatedToken (HANDLE hProcessToken); LPWSTR GetFullPath (LPCWSTR szFilePath); /******************************************************************************* Main program *******************************************************************************/ int wmain(int argc, WCHAR *argv[]) { LPWSTR fullPath = NULL; LPWSTR commandLine = NULL; STARTUPINFO si = {0}; PROCESS_INFORMATION pi = {0}; si.cb = sizeof(si); si.dwFlags = STARTF_USESHOWWINDOW; si.wShowWindow = SW_SHOWNORMAL; if ((fullPath = GetFullPath(L"%ProgramFiles(x86)%\\Notepad++\\notepad++.exe")) == NULL) { wprintf(L"File not found\n"); goto cleanup; } commandLine = calloc(wcslen(fullPath) + 14, sizeof(*fullPath)); wsprintf(commandLine, L"\"%s\" %s", fullPath, L"-multiInst"); if (RunAsDesktopUser(fullPath, commandLine, NULL, &si, &pi)) { WaitForSingleObject(pi.hProcess, INFINITE); if (pi.hThread != NULL) CloseHandle(pi.hThread); if (pi.hProcess != NULL) CloseHandle(pi.hProcess); } cleanup: free(fullPath); free(commandLine); return 0; } BOOL RunAsDesktopUser(LPCWSTR szApp, LPWSTR szCmdLine, LPCWSTR szCurrDir, STARTUPINFO *si, PROCESS_INFORMATION *pi) { BOOL bRetVal = FALSE; HANDLE hProcessToken = NULL; // Retrieve process token of own process if (!OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES, &hProcessToken)) { wprintf(L"OpenProcessToken failed, error code: %u\n", GetLastError()); goto cleanup; } // Check if own process is elevated if (!IsElevatedToken(hProcessToken)) { // Run process with user rights of own process if (!(bRetVal = RunProcess(szApp, szCmdLine, szCurrDir, si, pi))) goto cleanup; } else { // Add privilege SE_INCREASE_QUOTA_NAME to own process token if (!(bRetVal = SetPrivilege(hProcessToken, SE_INCREASE_QUOTA_NAME, TRUE))) goto cleanup; // Run process with user rights of desktop shell process if (!(bRetVal = RunLoweredProcess(szApp, szCmdLine, szCurrDir, si, pi))) goto cleanup; } bRetVal = TRUE; cleanup: CloseHandle(hProcessToken); return bRetVal; } BOOL RunProcess(LPCWSTR szApp, LPWSTR szCmdLine, LPCWSTR szCurrDir, STARTUPINFO *si, PROCESS_INFORMATION *pi) { // Start process with user rights of own process if (!CreateProcess(szApp, szCmdLine, (LPSECURITY_ATTRIBUTES) NULL, (LPSECURITY_ATTRIBUTES) NULL, FALSE, 0, (LPVOID) NULL, szCurrDir, si, pi)) { wprintf(L"CreateProcess failed, error code: %u\n", GetLastError()); return FALSE; } return TRUE; } BOOL RunLoweredProcess(LPCWSTR szApp, LPWSTR szCmdLine, LPCWSTR szCurrDir, STARTUPINFO *si, PROCESS_INFORMATION *pi) { BOOL bRetVal = FALSE; HWND hShellWnd = NULL; DWORD dwShellProcessID = 0; HANDLE hShellProcess = NULL; HANDLE hShellProcessToken = NULL; HANDLE hPrimaryToken = NULL; // Retrieve handle of desktop shell window if ((hShellWnd = GetShellWindow()) == NULL) { wprintf(L"GetShellWindow failed\n"); goto cleanup; } // Retrieve process id of desktop shell window GetWindowThreadProcessId(hShellWnd, &dwShellProcessID); if (dwShellProcessID == 0) { wprintf(L"GetWindowThreadProcessId failed\n"); goto cleanup; } // Retrieve process handle of desktop shell process hShellProcess = OpenProcess(PROCESS_QUERY_INFORMATION, FALSE, dwShellProcessID); if (hShellProcess == NULL) { wprintf(L"OpenProcess failed, error code: %u\n", GetLastError()); goto cleanup; } // Retrieve process token of desktop shell process if (!OpenProcessToken(hShellProcess, TOKEN_DUPLICATE, &hShellProcessToken)) { wprintf(L"OpenProcessToken failed, error code: %u\n", GetLastError()); goto cleanup; } // Duplicate process token of desktop shell process to a primary token if (!DuplicateTokenEx(hShellProcessToken, TOKEN_QUERY | TOKEN_DUPLICATE | TOKEN_ASSIGN_PRIMARY | TOKEN_ADJUST_DEFAULT | TOKEN_ADJUST_SESSIONID, NULL, SecurityImpersonation, TokenPrimary, &hPrimaryToken)) { wprintf(L"DuplicateTokenEx failed, error code: %u\n", GetLastError()); goto cleanup; } // Start process with user rights of desktop shell process if (!CreateProcessWithTokenW(hPrimaryToken, 0, szApp, szCmdLine, 0, (LPVOID) NULL, szCurrDir, si, pi)) { wprintf(L"CreateProcessWithToken failed, error code: %u\n", GetLastError()); goto cleanup; } bRetVal = TRUE; cleanup: CloseHandle(hShellProcessToken); CloseHandle(hPrimaryToken); CloseHandle(hShellProcess); return bRetVal; } BOOL IsElevatedToken(HANDLE hProcessToken) { DWORD elevationType = 0; DWORD dwReturnLength = 0; if (!GetTokenInformation(hProcessToken, TokenElevationType, &elevationType, sizeof(elevationType), &dwReturnLength)) { wprintf(L"GetTokenInformation failed, error code: %u", GetLastError()); return FALSE; } else { switch (elevationType) { case TokenElevationTypeDefault: return FALSE; case TokenElevationTypeLimited: return FALSE; case TokenElevationTypeFull: return TRUE; default: return FALSE; } } } BOOL SetPrivilege(HANDLE hProcessToken, LPCWSTR lpszPrivilege, BOOL bEnablePrivilege) { TOKEN_PRIVILEGES tp = {0}; LUID luid = {0}; if (!LookupPrivilegeValue((LPCWSTR) NULL, lpszPrivilege, &luid)) { wprintf(L"LookupPrivilegeValue, failed, error code: %u\n", GetLastError() ); return FALSE; } tp.PrivilegeCount = 1; tp.Privileges[0].Luid = luid; tp.Privileges[0].Attributes = (bEnablePrivilege ? SE_PRIVILEGE_ENABLED : 0); if (!AdjustTokenPrivileges(hProcessToken, FALSE, &tp, 0, (PTOKEN_PRIVILEGES) NULL, (PDWORD) NULL)) { wprintf(L"AdjustTokenPrivileges failed, error code: %u\n", GetLastError() ); return FALSE; } if (GetLastError() != ERROR_SUCCESS) { wprintf(L"AdjustTokenPrivileges failed to set the specified privilege.\n"); return FALSE; } return TRUE; } LPWSTR GetFullPath(LPCWSTR szFilePath) { LPWSTR szPath = (LPWSTR) szFilePath; BOOL bFreePath = FALSE; LPWSTR szBuf = NULL; DWORD dwBufLen = 0; DWORD nCCh = 0; // Expand environment variables do { szBuf = (LPWSTR) realloc(szBuf, dwBufLen * sizeof(*szBuf)); nCCh = ExpandEnvironmentStrings(szPath, szBuf, dwBufLen); if (nCCh == 0) break; if (nCCh == dwBufLen) break; dwBufLen = nCCh; } while (TRUE); if (nCCh > 0) { szPath = szBuf; bFreePath = TRUE; } // Search file name in PATH and current directory szBuf = NULL; dwBufLen = 0; do { szBuf = (LPWSTR) realloc(szBuf, dwBufLen * sizeof(*szBuf)); nCCh = SearchPath((LPCWSTR) NULL, szPath, (LPCWSTR) NULL, dwBufLen, szBuf, NULL); if (nCCh == 0) break; if (nCCh < dwBufLen) break; dwBufLen = nCCh; } while (TRUE); if (bFreePath) free(szPath); if (nCCh > 0) return szBuf; else return NULL; }
-
@dinkumoil
Wow, it’s miles and miles of codes for just preventing from elevation ! I’ll try firstly One Line solution of @SinghRajenM .
Thank you. -
@donho said:
I’ll try firstly One Line solution of @SinghRajenM .
Of course.
Wow, it’s miles and miles of codes
It’s not that bad, the absolutely core functionality is about to 90 lines of code which you can shorten even more.
for just preventing from elevation !
It’s not a “just”. For this functionality there is no ready-to-use Windows API. That the
ShellExecute
one-liner does the job is an undocumented feature and relies on the current implementation of Explorer.exe. And with this method it is not possible to start the unelevated process with parameters. -
The solution of @SinghRajenM is tested and works fine! Merged into the master of wingup:
https://github.com/notepad-plus-plus/wingup/commit/af34920693261307d34bb530622e6d70cbe875d2Thank you @SinghRajenM for your hint and your solution (again, besides of NSIS).
-
I have tested the ShellExec one-liner solution more thoroughly and noticed the following:
If a user wants to install a plugin, an UAC dialog pops up and requests for confirmation. After the plugin is installed Notepad++ restarts. So far so good.
If the user now wants to install another plugin, the plugin gets installed without an UAC dialog poping up, it is just done and Notepad++ restarts after that.
It seems like though Notepad++ obviously runs with user rights, it actually does not.
-
Sorry, I was wrong. I have tested with the wrong debug binary which hadn’t contained your last ShellExecute patch. Sorry for the inconvenience.