Re: IIS Directory traversal vulnerability
The IIS Directory Transversal Vulnerability is in regards to an improperly implemented IIS engine, which improperly interprets unicodes (e.g. %c0%9v) and allows the web client to "transverse" above the webserver's document root (usually set to c:/inetpub/wwwroot). If you review your logs in c:\winnt\system32\Logs\W3SVC1 or something like that, you'd discover that an entry such as http://<target_host>/scripts/..%c0%9v../winnt/system32/cmd.exe?/c+dir in the web browser will be intepreted as http://<target_host>/scripts/../../winnt/system32/cmd.exe?/c+dir by IIS. The above line will basically dir your c:/inetpub/scripts directory!!
Imagine what you can do with this!! ...issue a command to format the whole hardisk!!!!
The dr.exe file you found in the ../scripts directory is probably a re-named copy of cmd.exe as this makes the intruder's life a little easier and mask the activities from IDSs.
Anyway, M$ has issued a patch for this under MS00-57 and MS00-78 to address this vulnerability.
HTH.
Patrick Cheong
Security Specialist
Hitechniaga Sdn Bhd
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Any advice would be much appreciated - a couple of our boxes seem to
> have been exploited using a directory traversal vulnerabiltiy, by
> uploading a file called "dr.exe", and then passing this commands to
> remove files from the box.
>
> I have recovered our logfiles and the data fortunately, and I am still
> examining the log's.
>
> Is this dr.exe thing a known attack, (I can't seem to find anything
> about it).?
>
> The attacked boxes did have all the latest patches applied to them, and
> I double checked this during the code red crisis, and applied any that
> were missing.
>
> Any information would be much appreciated.
>
> Regards
> Lee
> - --
> Lee Evans
> Vital Online Ltd
>
> This message is intended only for the use of the person(s) ("The
> intended recipient(s)") to whom it is addressed. It may contain
> information which is privileged and confidential within the
> meaning of applicable law. If you are not the intended recipient,
> please contact the sender as soon as possible. The views expressed in
> this communication may not necessarily be the views held by Vital
> Online Ltd.
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.0.6 (GNU/Linux)
> Comment: For info see http://www.gnupg.org
>
> iD8DBQE7XpKrhtUFQXeFbZYRAh0mAKCTpYRfp5m/MBHHc/tvYYdxMqf9qQCeNpru
> +QqVQuyw/IhvuMQfwnP7lhc=
> =Zel8
> -----END PGP SIGNATURE-----
>
>
> ----------------------------------------------------------------------------
> This list is provided by the SecurityFocus ARIS analyzer service.
> For more information on this free incident handling, management
> and tracking system please see: http://aris.securityfocus.com
Reply to: