• 设为首页
  • 收藏本站
  • 积分充值
  • VIP赞助
  • 手机版
  • 微博
  • 微信
    微信公众号 添加方式:
    1:搜索微信号(888888
    2:扫描左侧二维码
  • 快捷导航
    福建二哥 门户 查看主题

    IIS Short File/Folder Name Disclosure(iis短文件或文件夹名泄露)

    发布者: Error | 发布时间: 2025-6-27 15:22| 查看数: 57| 评论数: 0|帖子模式

    I. 背景
    ---------------------
    "IIS is a web server application and set of
    feature extension modules created by Microsoft for use with Microsoft Windows.
    IIS is the third most popular server in the world." (Wikipedia)
    II. 概述
    ---------------------
    Vulnerability Research Team discovered a  vulnerability
    in Microsoft IIS.
    The vulnerability is caused by a tilde character "~" in a Get request, which could allow remote attackers
    to diclose File and Folder names.
    III. 影响产品
    ---------------------------
        IIS 1.0, Windows NT 3.51
        IIS 2.0, Windows NT 4.0
        IIS 3.0, Windows NT 4.0 Service Pack 2
        IIS 4.0, Windows NT 4.0 Option Pack
        IIS 5.0, Windows 2000
        IIS 5.1, Windows XP Professional and Windows XP Media Center Edition
        IIS 6.0, Windows Server 2003 and Windows XP Professional x64 Edition
        IIS 7.0, Windows Server 2008 and Windows Vista
        IIS 7.5, Windows 7 (error remotely enabled or no web.config)
        IIS 7.5, Windows 2008 (classic pipeline mode)
        Note: Does not work when IIS uses .Net Framework 4.
    IV. Binary Analysis & Exploits/PoCs
    ---------------------------------------
    Tilde character "~" can be used to find short names of files and folders when the website is running on IIS.
    The attacker can find important file and folders that they are not normaly visible.
    In-depth technical analysis of the vulnerability and a functional exploit
    are available through:
    http://soroush.secproject.com/blog/2012/06/microsoft-iis-tilde-character-vulnerabilityfeature-short-filefolder-name-disclosure/
    V. 解决方案
    ----------------
    There are still workarounds through Vendor and security vendors.
    Using a configured WAF may be usefull (discarding web requests including the tilde "~" character).
    VII. 参考
    ----------------------
    http://support.microsoft.com/kb/142982/en-us
    http://soroush.secproject.com/blog/2010/07/iis5-1-directory-authentication-bypass-by-using-i30index_allocation/
    来源:https://www.jb51.net/hack/56750.html
    免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!

    最新评论

    浏览过的版块

    QQ Archiver 手机版 小黑屋 福建二哥 ( 闽ICP备2022004717号|闽公网安备35052402000345号 )

    Powered by Discuz! X3.5 © 2001-2023

    快速回复 返回顶部 返回列表