发信人: PowerStation.bbs@bbs.sjtu.edu.cn (Warez Killer), 信区: cnhacker
标 题: WindowsNT的25个漏洞 (6)
发信站: 饮水思源站 (Sun Apr 6 02:52:16 1997)
转信站: Lilac!ustcnews!ustcnews!sjtunews!sjtubbs
出 处: bbs.sjtu.edu.cn
Network Attacks
(13)IIS Web Server
Redirect hole
4.0
A URL such as http://www.domain.com/scripts/script_name%0A%0D>
PATH\target.bat will create an output file 'target.bat''.
(14)Truncate hole
4.0
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\
target.bat will create a file 'target.bat''.
If the file 'target.bat' exists, the file will be truncated.
Which all brings us to the IIS...
(15)BAT/CMD hole
3.51 4.0
IIS 1.0
Sending a command line to the server such as 'http://www.domain.com/scripts/expoit.bat?&commandA+?&commandB' to
the server and clicking the stop button on the browser will cause the server
to execute DOS commands on the server
Adding a '+?&time' or '+?&date' to the end of the command, will cause the
server to pause for input, clicking the stop button on the browser will interrupt
the server making a log entry of the command string executed.
(16)Dot dot /..\.. hole
4.0
IIS 1.0
A URL such as 'http://www.domain.com/..\..' allows you to browse and
download files outside of the webserver content root directory.
A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you
to execute the target script.
By default user 'Guest' or IUSR_<COMPUTERNAME> has read access to all
files on an NT disk. These files can be browsed, executed or downloaded by
wandering guests.
--
※ 来源:·饮水思源站 bbs.sjtu.edu.cn·[FROM: gos.oz.cc.utah.]
Powered by KBS BBS 2.0 (http://dev.kcn.cn)
页面执行时间:3.230毫秒