| ---[ Phrack Magazine Volume 8, Issue 54 Dec 25th, 1998, article 08 of 12 |
|
|
|
|
| -------------------------[ NT Web Technology Vulnerabilities |
|
|
| |
| --------[ rain.forest.puppy / [WT] <rfpuppy@iname.com> |
|
|
|
|
| *Note: most of the vulnerabilities in this document have NOT been made public; |
| they were discovered by rain.forest.puppy, or other members of WT. Lots |
| of new toys out there on the Internet lately. Seems like the web is the |
| way to go, and every software spigot is demanding they be 'web-enabled'. A |
| lot are reinventing the wheel, bundling sub-standard web servers to serve up |
| their HTML and Java interface. |
|
|
| But this article isn't about them. There's too many, and they're to easy to |
| use as vulnerable targets. It's much more fun to find the needle in the |
| haystack, so I'm going to focus on some more common setups. On to the show. |
|
|
|
|
| ----[ IIS 4.0 |
|
|
| IIS is not too bad as a web server. It still doesn't compare to Apache, but |
| it has flexible scripting and server-side abilities. But, of course, |
| everything has its price... |
|
|
| One interesting problem (and probably the only one that may be previously |
| published at the time of this writing) is that appending an ".idc" extension |
| to the end of a URL will cause IIS installations to try to run the so-called |
| .IDC through the database connector .DLL. If the .IDC doesn't exist, than it |
| returns a rather informative page stating that it can't open |
| %documentroot%\<bogus name>.idc. For example: |
|
|
| "Cannot open c:\inetpub\wwwroot\index.html.idc" |
|
|
| Wow, absolute paths on the server. Very interesting. What good does this do? |
| Well, it gives you some insight and hints. If you're trying to exploit CGI or |
| other server-based programs, knowing what drive you're on when trying to |
| access outside documents blindly helps a lot. For example, if the IDC query |
| came back: |
|
|
| f:\webs\1\index.html.idc |
|
|
| then you know you'll probably have to specify 'c:\' to get to any Windows NT |
| system files; you can't do silly stuff like: |
|
|
| ../../../../winnt/system/repair/sam._ |
|
|
| since you're doing relative addressing, and staying on drive F. Another |
| common return is something like" |
|
|
| "Cannot open d:\20x.140.3x.25\index.html.idc" |
|
|
| Where the IP address is the full IP address of the webserver. This usually |
| indicates that the site is on a system that's probably hosting multiple |
| websites. |
|
|
| Also, usually the site that's based in \inetpub\wwwroot is the 'default' site, |
| and may have other things associated with it (like sample files, etc... |
| We'll get to these later). This is important to remember. |
|
|
|
|
| ----[ FrontPage Webbots |
|
|
| A really quick recap on how webbots work: Frontpage inserts some HTML comments |
| that specify the parameters of the webbot. Then, the form is submitted to |
| /_vti_bin/shtml.dll, and the URL of the page is given. shtml.dll reads through |
| the given page, and interprets the webbot/HTML comment code. |
|
|
| So, all the parameters that are involved in (most) webbots are embedded in the |
| HTML page themselves. Let's take an example from a corporate site that makes |
| a very popular FTP suite (this is HTML code): |
|
|
| <!--webbot BOT="GeneratedScript" endspan --> |
| <form method="POST" action="../_vti_bin/shtml.dll/downloads/ftp.html" |
| name="FrontPage_Form1" webbot-action="--WEBBOT-SELF--"> |
| <!--webbot bot="SaveResults" |
| u-file="d:\us\product_downloads\download_log.csv" |
| s-format="TEXT/CSV" s-label-fields="FALSE" s-builtin-fields="Date Time" |
| s-form-fields u-confirmation-url="../_confirmations/ftp.html" |
| startspan --> |
|
|
| Notice that this site is saving the results to a file (and the fact that it |
| has "d:\.." says that it is a Windows-based server). But the more important |
| part to notice is the 'u-confirmation-url' field. This page has a large form |
| for you to fill in. When you submit it, what you entered is saved in the |
| 'u-file', and then you're redirected to 'u-confirmation-url'. Don't want |
| to give all your personal information to them? Well, just go to |
| 'u-confirmation-url'. In this case, this was a registration page for download |
| of the eval. Since I got tired of filling out my information all the |
| time, I now just go to the confirmation URL and download away, bypassing the |
| form. |
|
|
| On a related note, if bot="SaveResults", and u-file is in the web structure |
| (which it happens to be a lot on virtually hosted accounts), you're able to |
| view the contents of the file. For instance, |
|
|
| <!--webbot bot="SaveResults" |
| u-file="/_private/download.log" |
| s-format="TEXT/TEXT" s-form-fields startspan --> |
|
|
| means you can go to htp://site/_private/download.log and view all the info |
| everyone else entered. |
|
|
|
|
| ----[ IIS 3.0 to IIS 4.0 |
|
|
| There are several changes between IIS 3.0 and IIS 4.0. Sure, MMC is |
| important and all, but there's something else even better: there are default |
| associations made between certain file extensions and .DLLs. Let's look at a |
| particular example... |
|
|
| In IIS 3.0, you'd administer the website by going to http://site/iisadmin/, |
| which would pop over to using /scripts/iisadmin/ism.dll, and routing the |
| various .HTR files in that directory through itself. The .HTR files are |
| relatively useless without ism.dll to process them, and ism.dll has hard-coded |
| authentication built into it. |
|
|
| Now, upgrade from IIS 3.0 to 4.0. You now administer your site through |
| http://localhost:5416/. What about all those .HTRs in /scripts/iisadmin? |
| They're still there, unless you actually deleted them. And the problem? |
| IIS 4.0 associates all .HTRs with a new and improved ism.dll, which contains |
| no hard-coded authentication. So now, whenever you request a .HTR file, |
| IIS will happily process it for you, not caring about authentication. You |
| can now use the .HTR files in /scripts/iisadmin to your liking. Kinda. |
| None of them work, due to so many changes. EXCEPT FOR ONE: bdir.htr. bdir.htr |
| seems to still be happy, and gladly shows you all the directories on any |
| drive. You can navigate all the server's drives (and network mappings), but |
| all you get to see is directories (no files). In case you're wondering, you |
| can tell bdir.htr where to look by doing |
|
|
| /scripts/iisadmin/bdir.htr??<path> |
| ie: |
| /scripts/iisadmin/bdir.htr??d:\webs\ |
|
|
| I haven't played with the other file extensions, but there's a half-dozen or |
| so that IIS will now happily process (the normal ones like .ASP, .IDC, .HTR, |
| and other unfamiliar ones like .HTW, .IDQ, .IDA, .CER, etc). |
|
|
|
|
| ----[ Sample pages |
|
|
| While it's not a good idea to put included sample pages and applications on a |
| public server, still many places do. IIS 4.0 includes a rather large and |
| comprehensive demo site called 'Exploration Air', which employs many IIS 4.0 |
| web technologies. An interesting feature is the 'How It Works' button on the |
| bottom of every page, which takes you to a script that parses the pages code |
| into colorful tags. This is a problem. |
|
|
| It uses the Scripting.FileSystemObject to request the page. Luckily, it will |
| only let you use virtual paths; unfortunately, it allows the use of /../ to |
| escape to higher directories, including up into the root directory. This |
| allows it to open any file on the same drive. Using the .IDC bug above to |
| determine where the file rests, you can determine if you can get to WinNT |
| system files. You can also view the code of any page application (.ASP, |
| .CFM, .IDC, etc). For example: |
|
|
| http://site/iissamples/exair/howitworks/codebrws.asp?source=/../../boot.ini |
|
|
| could show the Windows NT boot.ini file. It's used in the ExAir sample site, |
| as shown above, and also the SDK, if installed, at |
| http://site/iissamples/sdk/asp/docs/codebrws.asp |
|
|
|
|
| ----[ Cold Fusion app.server 3.1 |
|
|
| Cold Fusion is a rather creative scripting language; it's a nice front end |
| to ODBC database connections. But I wouldn't be mentioning it here if it |
| didn't have any problems. |
|
|
| Like IIS 4.0, there's a few alarming things with the sample pages included |
| with CF. One is the Expression Evaluator at: |
|
|
| http://site/cfdocs/expeval/eval.cfm |
|
|
| They have a security check. It calls check_ip.cfm, which allows access only |
| from 127.0.0.1 (localhost). Bummer, we can't run raw code on the server. |
| But, let's check out: |
|
|
| http://site/cfdocs/expeval/exprcalc.cfm |
|
|
| It still doesn't do us any good, because it still uses eval.cfm to process |
| the expression(s) we enter. But, there's something more interesting: the |
| expression calculator lets us save and load files of expressions to |
| evaluate. And it just so happens that exprcalc.cfm is the form used to |
| LOAD files. And it let's us load any file we want. For instance: |
|
|
| http://site/cfdocs/expeval/exprcalc.cfm?OpenFilePath=c:\boot.ini |
|
|
| will display the contents of boot.ini in the window. Just like the IIS |
| codebrws.asp program, we can use it to look at any file we want. However, |
| exprcalc.cfm lets us specify other drive letters, while codebrws.asp is |
| limited to only the current drive. |
|
|
|
|
| ----[ Anonymous Mail |
|
|
| Very simply and quickly, |
|
|
| /cfdocs/expeval/sendmail.cfm?MailFrom=&MailTo=&Subject=&Message= |
|
|
| lets you send email. Not exactly a security breach, but not pleasant either. |
| You must fill in the variable values. |
|
|
|
|
| ----[ Proxy Problems |
|
|
| This is an interesting problem brought about not only by CF, but possibly |
| proxy software in general. CF includes an 'http client' application in |
|
|
| /cfdocs/examples/httpclient/mainframeset.cfm |
|
|
| which lets you type in an URL, and it will show you the HTML code in the |
| bottom window. Now, let's say, remotely I try to administer the IIS 4.0 |
| server that CF is running on by going to http://site:5416/. I get an error |
| stating I have to be local (127.0.0.1). Now, I go to the http-client CF |
| application on that same server. For the URL, I type "http://localhost:5416". |
| I get the correct page as the result. I have effectively bypassed the |
| security check. Using GET commands in the CF http-client application, I can |
| administrate the server. |
|
|
| What's really interesting in theory is that applications like this, and proxys |
| in general, can be used to abuse trust relationships and 'localhost only' |
| security. It'd be interesting in hearing what other people find along this |
| line. One example: |
|
|
| I surf to a company's firewall/web proxy from the 'outside'. I get an error |
| stating 'Denied/Unauthorized Access'. I then request from their proxy |
| 'GET http://localhost/'; and now I get the 'inside' web page with instructions |
| on how to use the proxy correctly to get out. Yes, there's obvious setup |
| problems (allowing outside requests), but that's not the point... |
|
|
|
|
| ----[ ODBC and MS SQL server 6.5 |
|
|
| Ok, topic change again. Since we've hit on web service and database stuff, |
| let's roll with it. Onto ODBC and MS SQL server 6.5. |
|
|
| I worked with a fellow WT'er on this problem. He did the good thing and told |
| Microsoft, and their answer was, well, hilarious. According to them, |
| what you're about to read is not a problem, so don't worry about doing |
| anything to stop it. |
|
|
| - WHAT'S THE PROBLEM? MS SQL server allows batch commands. |
|
|
| - WHAT'S THAT MEAN? I can do something like: |
|
|
| SELECT * FROM table WHERE x=1 SELECT * FROM table WHERE y=5 |
|
|
| Exactly like that, and it'll work. It will return two record sets, with each |
| set containing the results of the individual SELECT. |
|
|
| - WHAT'S THAT REALLY MEAN? People can possibly piggyback SQL commands into |
| your statements. Let's say you have: |
|
|
| SELECT * FROM table WHERE x=%%criteria from webpage user%% |
|
|
| Now, what if %%criteria from webpage user%% was equal to: |
|
|
| SELECT * FROM sysobjects |
|
|
| It would translate to: |
|
|
| SELECT * FROM table WHERE x=1 SELECT * FROM sysobjects |
|
|
| which would be valid SQL and execute (both commands). But wait, there's more. |
| Say you had: |
|
|
| SELECT * FROM table WHERE x=%%criteria%% AND y=5 |
|
|
| If we used our above example, we'd get: |
|
|
| SELECT * FROM table WHERE x=1 SELECT * FROM sysobjects AND y=5 |
|
|
| which isn't valid SQL, and won't work. Well, there's a comment indicator, |
| which tells MS SQL server to just ignore the rest of the line. If criteria is |
| "1 SELECT * FROM sysobjects --", then the '--' causes the rest of the |
| statement ("AND y=5") to be ignored. |
|
|
| - WHAT FILES OF MINE ARE AFFECTED? Well, ASP and IDC files are problematic. |
| At least you can fix ASP files, but you're kinda stuck when it comes to |
| IDCs. |
|
|
| - EXACTLY HOW ARE IDCs AFFECTED? Say we wanted to query a database of |
| names=phone #s, where the user gives us a name, and we supply all the |
| matching phone numbers. A Sql call like |
|
|
| SELECT * FROM phonetable WHERE NAME='namewewant' |
|
|
| would work. However, we need to dynamically specify "namewewant" to be |
| the name the user does want. So, if we write the Sql statement: |
|
|
| SELECT * FROM phonetable WHERE NAME='%name%' |
|
|
| And in our HTML form, we have an input box called 'name'. If this .idc |
| was called 'phone.idc', we'd call it: |
|
|
| http://site/phone.idc?name=rfp |
|
|
| The server would place "rfp" in place of %name%, and query the SQL server |
| to select * where name='rfp'. |
|
|
| Now, stick more commands on the line. Executing our phone.idc from above |
| like so: |
|
|
| phone.idc?name=rfp select * from table2 |
|
|
| would lead to an expanded Sql query in the .idc to |
|
|
| SELECT * FROM phonetable WHERE name='rfp select * from table2' |
|
|
| Semi-close, but the single quotes cause all of the stuff to be the |
| selection criteria. What if we introduced OUR OWN single quote? |
|
|
| phone.idc?name=rfp' select * from table2 -- |
|
|
| would be |
|
|
| SELECT * FROM phonetable WHERE name='rfp' select * from table2 --' |
|
|
| We need to add the comment to get rid of the trailing single quote. BUT... |
| .idc's are smart...they will escape a single quote into two single quotes, |
| which indicate a data single quote. I.e. |
|
|
| phone.idc?name=rfp' command |
|
|
| will become |
|
|
| SELECT * FROM phonetable WHERE name='rfp'' command' |
|
|
| And since two '' make one data ', the table will be queried for a column |
| that matches: |
|
|
| "rfp' command" |
|
|
| Now wait, if .idc's protect against this, then why the hell am I wasting |
| my breath? You see, they're still vulnerable. They suck when they secretly |
| put an extra single quote into the SQL string. But....when you query numeric |
| values, you don't use single quotes; single quotes are only for strings. So, |
| lets's say we want to use our phone number database, but give a phone number, |
| and look up the associated name. We'll also say that phone numbers are |
| stored as long ints (numeric values), rather than strings, since we need a |
| numeric entry for this example. |
|
|
| So, I want to know who has the phone number 5551212. A hardcoded SQL call |
| would be |
|
|
| SELECT * FROM phonetable WHERE phone=5551212 |
|
|
| And the variable version (in an .idc): |
|
|
| SELECT * FROM phonetable WHERE phone=%phonenum% |
|
|
| Whoa! No single quotes to worry about. Now we just do a simple: |
|
|
| phone.idc?phonenum=5551212 select * from table1 |
|
|
| And that expands to |
|
|
| SELECT * FROM phonetable WHERE phone=5551212 select * from table1 |
|
|
| - ARE THERE ANY .IDCs SOMEONE COULD USE AGAINST ME? Glad you asked. There's |
| a file included with IIS 3.0 in the /scripts/tools directory, called ctss.idc, |
| which has a SQL statement like: |
|
|
| CREATE TABLE %table% (...table defs...) |
|
|
| This is simple to exploit. Since you stuck with the inital 'CREATE TABLE', |
| you must finish that to be a valid command. Giving a table name and a simple |
| column definition will be sufficient. And then we tack on our command, and |
| then a '--' to ignore the rest of the table defs. So, |
|
|
| ctss.idc?table=craptable (f int) select * from table1 -- |
|
|
| Would give us |
|
|
| CREATE TABLE craptable (f int) select * from table1 -- \ |
| (...table defs...) |
|
|
| (However, with ctss.idc, you need to know the DSN, UID, and PWD beforehand... |
| so you're somewhat safe) |
|
|
| - EXACTLY HOW ARE ASPs AFFECTED? Typical ADODB code looks something |
| like: |
|
|
| <% SQLquery="SELECT * FROM phonetable" |
| Set Conn = Server.CreateObject("ADODB.Connection") |
| Conn.Open "DSN=websql;UID=sa;PWD=pwd;DATABASE=master" |
| Set rec = Server.CreateObject("ADODB.RecordSet") |
| rec.ActiveConnection=Conn |
| rec.Open SQLquery %> |
|
|
| Which essentially performs a SELECT * FROM phonetable on the websql DSN, |
| using user=sa, pwd=pwd, on database=master. Then you use fancy formating |
| of 'rec' to display the output in ASP. |
|
|
| Well, let's take into account user supplied variables now. |
|
|
| <% SQLquery="SELECT * FROM phonetable WHERE name='" & _ |
| request.querystring("name") & "'" |
| Set Conn = Server.CreateObject("ADODB.Connection") |
| Conn.Open "DSN=websql;UID=sa;PWD=pwd;DATABASE=master" |
| Set rec = Server.CreateObject("ADODB.RecordSet") |
| rec.ActiveConnection=Conn |
| rec.Open SQLquery %> |
|
|
| So, now our variable "name" is stuck into the SQLquery string, between the |
| two ' '. Guess what?! ASP doesn't care about single quotes. It won't be |
| smart like an .IDC and put in the extra ' to make the command ' into a |
| data '. So, what does the SQLquery string look like when we call it like |
| phone.idc? Let's say the above is phone.asp: |
|
|
| phone.asp?name=rfp' select * from table1 -- |
|
|
| Gives us SQLquery that is: |
|
|
| SELECT * FROM phonetable WHERE name='rfp' select * from table1 --' |
|
|
| Which works. No sweat. |
|
|
| I'm sure some interesting questions come to mind: |
|
|
| - BUT I DON'T KNOW THE DSN NAME, LOGIN NAME, OR PASSWORD! You don't need |
| them. The developer of the page that contains the SQL will already take care |
| of that. We're piggy-backing SQL commands onto a command that will work |
| (otherwise, the page/application wouldn't work normally anyway!). If the |
| normal page can get to the SQL server through a firewall, VPN, etc, then so |
| can this command. It can, and will, go wherever the normal pages/SQL can |
| go. |
|
|
| - BUT I CAN'T VIEW THE SECOND RETURNED RECORDSET! Yes, this is a problem |
| most of the time. Not too many applications are built assuming multiple |
| recordset returns, so usually don't cooperate. But, let me just say |
| there's a stored procedure in SQL that lets you email results of a command |
| to anywhere....you don't need to see the results in your web browser. |
|
|
| - BUT WHAT GOOD IS RUNNING MORE SQL COMMANDS? My friend, my friend. Think |
| bigger. Think better. Think stored procedures. I'm not going to include |
| exploit examples, because that's not what this is about. This is simply to |
| show that the problem exists. |
|
|
| - BUT WHAT IF THEY HAVE COMPLEX SQL COMMANDS? Yes, this can be tricky, but |
| it's still possible. Think of it like writing a buffer overflow. ;-) If |
| we have: |
|
|
| SELECT * FROM table WHERE ((x=%%criteria) AND (y=5)) |
|
|
| then we have parentheses to deal with. But still doable. The goal is to |
| close out any open parentheses opened before the piggybacked SQL statement, |
| and use -- (comment) to ignore anything after. |
|
|
| - HOW CAN I PROTECT MYSELF? Put quotes around every string taken from the |
| web user that's used in your SQL statement, and also change any single |
| quotes (') into double single quotes ('')--this protects everything. In case |
| of numeric criteria, check to see that the numeric string given back is, |
| in fact, all numbers. And since you can't do any of the above in IDCs, |
| switch to ASP. Don't allow access to any of the SQL servers extended |
| procedures. Best of all, don't use raw SQL in your web applications; |
| called custom stored procedures on the SQL server, and pass the web |
| user's dynamic criteria as parameters. |
|
|
| Note: we've only had the time (and resources) to conduct batch SQL |
| vulnerabilities against MS SQL server 6.5. We'd be interested in hearing |
| from other people if other DB platforms (Oracle, Informix, etc) are also |
| vulnerable. |
|
|
|
|
| ----[ Conclusion |
|
|
| Well, that about wraps it up for now. What are the morals to the above |
| stories? |
|
|
| - Don't use sample files/applications on public/production servers. |
| - Don't use 'local-host only' security, especially on proxys. |
| - Watch what exactly is changed when you upgrade. |
| - Don't assume user's input is ok for SQL queries. |
|
|
| In short, use your brain. Till next time, have fun. |
|
|
| rain.forest.puppy / [WT] rfpuppy@iname.com |
|
|
| ----[ EOF |
|
|