TUCoPS :: Web :: IIS :: iis100~1.htm

IIS view dir structure, view/delete files, exec arbitrary code, DoS (in short, Duke, a shitstorm!)
Vulnerability

    IIS

Affected

    IIS 4, 5

Description

    Following is based on a Internet Security Systems Security  Alert.
    A flaw exists in Microsoft Internet Information Server (IIS)  that
    may allow remote attackers to view directory structures, view  and
    delete files, execute arbitrary commands, and deny service to  the
    server.   It is  possible for  attackers to  craft URLs  that take
    advantage  of  a  flaw  in  IIS  URL  decoding routines.  Security
    mechanisms  within  these  routines  can  be bypassed.  All recent
    versions of IIS are affected by this vulnerability.

    This vulnerability is very similar to the IIS Unicode  Translation
    Vulnerability we had before.   As with the Unicode  vulnerability,
    this is a  variation of the  common "dot dot"  directory traversal
    attack.  Older Web servers were vulnerable to this attack  because
    the ".." directories in URLs allowed attackers to back out of  the
    web root directory.  This  allowed attackers to navigate the  file
    system  or  execute  commands  at  will.  IIS and most current Web
    servers have  incorporated security  measures to  prevent the "dot
    dot" attack.   These security  measures deny  all queries  to URLs
    that contain  too many  leading slashes  or ".."  characters.  The
    Unicode vulnerability was a result of improper handling of Unicode
    encoded ".." and "/" characters.  This new vulnerability  exploits
    another flaw in the IIS  encoding mechanism that allows a  similar
    result.

    When IIS receives a query  on a server-side script, it  performs a
    decoding  pass  on  the  request.   The  string  is  decoded  into
    canonical  form  and  numerous  security  checks  are performed to
    ensure the request is valid.  A second decoding routine is run  on
    the  request  to  parse  the  parameters  after the filename.  IIS
    mistakenly  parses  the  filename  again  with  these   additional
    parameters.   This flaw  allows specially  crafted requests  which
    include ".." and "/" characters to bypass security checks.

    All queries are processed under the IUSR_machine context, which is
    part of the 'Everyone' and 'Users' group.  This provides access to
    the  web   directory  and   most  non-administrative    functions.
    Attackers may  not directly  modify or  delete files  owned by the
    Administrator, nor run commands with privilege.

    By  crafting  a  request  after  a  virtual directory with execute
    permissions, it is possible  for an attacker to  execute arbitrary
    commands.  Attackers may then  have the ability to manipulate  the
    appearance of the  Web site, download  sensitive data, or  install
    backdoor software.

    This class of IIS vulnerabilities  is well known and lends  itself
    to  being  widely  exploited  by  incorporation  into  worms   and
    automatic scanning tools.

    Older versions of IIS are not vulnerable.

Solution

    Please refer to the following Microsoft Bulletins for  information
    on the patches:

        Microsoft IIS 4.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=29787
        Microsoft IIS 5.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=29764

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH