Penetration Testing mailing list archives
cmdasp.asp & unicode
From: César González <cesar () eureka-sistemas com>
Date: Thu, 16 Aug 2001 13:28:17 +0200
Hello all,
First of all, Thankx H.D. Moore for the reply to my last post ("Imformation
about mkilog.exe") and sorry about my poor english ;).
I am finishing a pen-test to a company and my customer said to me to try to
grab te data of the database. The machine who runs the databas soft, runs
IIS too, and it ts vulnerable to an UNICODE exploit. I have uploaded the
cmdasp.asp script but it seems to fail in some operations like deleting
files. For example : I upload cmdasp.asp to c:\inetpub\scripts\ with the
tftp trick but when i try to delete the file itself i got permision denied.
The user under the script runs is IUSR_SIVAC. (sivac is the database and the
name of the computer in the windows network)
My questions are : ¿Why cant i delete the files i have uploaded to
c:\inetpub\scripts? The user SIVAC should be allowed... if i can write in the
directory i should be allowed to delete too, isnt it?. ¿Could I force to
change the user under the cmd.asp.asp runs?
Thanks in advance.
César González Revilla
Eureka Sistemas S.L.
C/ San Fernando 16 bajo
39010 Santander
http://www.eureka-sistemas.com/
cesar () eureka-sistemas com
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org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=y6jk
-----END PGP PUBLIC KEY BLOCK-----
----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/
Current thread:
- cmdasp.asp & unicode César González (Aug 16)
- Re: cmdasp.asp & unicode CT (Aug 16)
- <Possible follow-ups>
- cmdasp.asp & unicode Mike Ahern (Aug 16)
