ASP directory vulnerabilities and IIS semicolon vulnerabilities for IIS (;) temporary solution

Source: Internet
Author: User

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

First said the solution: Download the Silver Month Server tool, use the tool-> component Downloader download Isapi_rewrite, decompression out.

Add the Isapi_rewrite.dll in Isapi_rewrite as ISAPI, the name is Isapi_rewrite, this is pseudo static, did not install.

Download the vulnerability patch package, which is the item selected in the following figure, download open!

Replace the Httpd.ini in the Isapi_rewrite directory with the Httpd.ini in the patch package.

Or to ensure that the Httpd.ini below Isapi_rewrite has the following two lines of rules that are selected! This will prevent these two IIS vulnerabilities, is to be valid for these two rules, isapi_ The Httpd.ini in the rewrite directory is a global configuration file that will be applied to all sites, which will protect all sites from vulnerabilities.

Let's talk about this vulnerability (below), as long as a file has (. asp) followed by a semicolon (;) followed by a random character with an extension such as (cao.asp;ca.jpg) the file Windows will be a JPG image file, However, this file is run as an ASP in IIS, (cao.asp;ca.jpg) This file IIS will be identified (cao.asp), the semicolon after the things ignored--. So say (cao.asp; JPG)!

There is a picture in the patch bag, put the law under each site, if someone exploit this loophole! will see this picture!

Principle: In Windows to search for multiple files is to use semicolons (;) to split, if the file itself with a semicolon how to?--。 haha system can not search for this file! The following figure, obviously have this h.asp;kk.jpg this file, in Windows Search will be treated as h.asp and kk.jpg these two files to search, this is a Windows design is inappropriate, should say should not let the semicolon (;) do file name !

But want to know CDX, CER and so on and so on and so on file are ASP's mapping! So aaa.cdx;kk.jpg will be run as ASP! If these mappings are not deleted, they will be exploited.

The following figure is an ASP directory vulnerability, as long as all files below the directory named xxxx.asp will be run as ASP files. This is an ASP directory vulnerability

Silver Moon Network, Silver Month Server tool provides IIS protection update policy.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.