当前位置: 代码网 > 服务器>网络安全>企业安全 > IIS Short File/Folder Name Disclosure(iis短文件或文件夹名泄露)

IIS Short File/Folder Name Disclosure(iis短文件或文件夹名泄露)

2012年07月04日 企业安全 我要评论
IIS Short File/Folder Name Disclosure(iis短文件或文件夹名泄露)IIS Short File/Folder Name Disclosure(iis短文件或文件夹名泄露)... 12-07-04
i. 背景
---------------------
"iis is a web server application and set of
feature extension modules created by microsoft for use with microsoft windows.
iis is the third most popular server in the world." (wikipedia)
ii. 概述
---------------------
vulnerability research team discovered a  vulnerability
in microsoft iis.
the vulnerability is caused by a tilde character "~" in a get request, which could allow remote attackers
to diclose file and folder names.
iii. 影响产品
---------------------------
    iis 1.0, windows nt 3.51
    iis 2.0, windows nt 4.0
    iis 3.0, windows nt 4.0 service pack 2
    iis 4.0, windows nt 4.0 option pack
    iis 5.0, windows 2000
    iis 5.1, windows xp professional and windows xp media center edition
    iis 6.0, windows server 2003 and windows xp professional x64 edition
    iis 7.0, windows server 2008 and windows vista
    iis 7.5, windows 7 (error remotely enabled or no web.config)
    iis 7.5, windows 2008 (classic pipeline mode)
    note: does not work when iis uses .net framework 4.
iv. binary analysis & exploits/pocs
---------------------------------------
tilde character "~" can be used to find short names of files and folders when the website is running on iis.
the attacker can find important file and folders that they are not normaly visible.
in-depth technical analysis of the vulnerability and a functional exploit
are available through:
http://soroush.secproject.com/blog/2012/06/microsoft-iis-tilde-character-vulnerabilityfeature-short-filefolder-name-disclosure/
v. 解决方案
----------------
there are still workarounds through vendor and security vendors.
using a configured waf may be usefull (discarding web requests including the tilde "~" character).
vii. 参考
----------------------
http://support.microsoft.com/kb/142982/en-us
http://soroush.secproject.com/blog/2010/07/iis5-1-directory-authentication-bypass-by-using-i30index_allocation/
(0)

相关文章:

版权声明:本文内容由互联网用户贡献,该文观点仅代表作者本人。本站仅提供信息存储服务,不拥有所有权,不承担相关法律责任。 如发现本站有涉嫌抄袭侵权/违法违规的内容, 请发送邮件至 2386932994@qq.com 举报,一经查实将立刻删除。

发表评论

验证码:
Copyright © 2017-2025  代码网 保留所有权利. 粤ICP备2024248653号
站长QQ:2386932994 | 联系邮箱:2386932994@qq.com