发信人: PowerStation.bbs@bbs.sjtu.edu.cn (Warez Killer), 信区: cnhacker
标 题: WindowsNT的25个漏洞 (7)
发信站: 饮水思源站 (Sun Apr 6 02:59:05 1997)
转信站: Lilac!ustcnews!ustcnews!sjtunews!sjtubbs
出 处: bbs.sjtu.edu.cn
(17)Get ../.. hole
This is how you crash Microsoft's IIS Web Server
昑elnet to IIS Server port 80 昑ype "GET ../.." <CR> 昐ay Bye Bye
Active Server
IIS 1.0 & 2.0
DESCRIPTION
A serious security hole was found in Microsoft's Active Server Pages (ASP)
by Juan T. Llibre <j.llibre@codetel.net.do>. This hole allows Web clients to
download unprocessed ASP files potentially exposing user ids and passwords.
ASP files are the common file type used by Microsoft's IIS and Active Server
to perform server-side processing.
HOW IT WORKS
To download an unprocessed ASP file, simply append a period to the asp URL.
For example: http://www.domain1.com/default.asp becomes http://www.domain1
com/default.asp. With the period appendage, Internet Information Server (IIS)
will send the unprocessed ASP file to the Web client, wherein the source to the
file can be examined at will. If the source includes any security parameter
designed to allow access to other system processes, such as an SQL database,
they will be revealed.
FTP Holes
(18)CD hole
3.5x
The Microsoft FTPserver that ships with Windows NT 3.5x is just one huge
security headache.
The problem is that you can set up your FTP site in c:\ftp, but when a user
connects, they can possibly then execute a cd c:\winnt35\system32, and
be in your system directory .
Te only ways you can get around this difficulty - if you can repartition,
the safest thing to do is put the FTP directory at the root of a partition,
and give the FTP service no access to any other drive. Failing that, you
can go through (command line is best) and remove all permissions from
"everyone", and then make sure the FTP anon user has no access to
anywhere outside the ftp tree. Oh what a pain in the ass for the admins
using this crapware...
(19)Passive Connection
3.5, 3.51, 4.0
The FTP server that comes with windows NTallows passive connections
to be established dependant upon the port address given by client. This
allows arbitrary commands to be executed from the FTP server
In the registry you will find
<System\CurrentControlSet\Services\MSFTPSVC\Parameters> where the
value could be enabled for value <EnablePortAttack: REG_DWORD: >.
If this value is '0', and not '1' then there exists a problem.
--
※ 来源:·饮水思源站 bbs.sjtu.edu.cn·[FROM: gos.oz.cc.utah.]
Powered by KBS BBS 2.0 (http://dev.kcn.cn)
页面执行时间:3.326毫秒