IIS 6.0 ASP directory vulnerability and semicolon vulnerability temporary solution

  

first say the solution:

Download Silvermoon server tool, use the tool-> component downloader to download ISAPI_Rewrite, extract it.



Add ISAPI_Rewrite.dll in ISAPI_Rewrite to ISAPI, the name is ISAPI_Rewrite, this is pseudo-static, you have not installed it



Download the vulnerability patch package, which is the item selected in the figure below, and download it!



Replace httpd.ini in the ISAPI_Rewrite directory with httpd.ini in the patch package.



Or to ensure that the httpd.ini under ISAPI_Rewrite has the following two rules for the selection of the following figure! This will prevent these two IIS vulnerabilities. It is necessary to make these two rules effective. The httpd.ini under the ISAPI_Rewrite directory is a global configuration file that will be applied to all websites, which will protect all websites from vulnerabilities.


Let’s talk about this vulnerability (below), as long as a file has (.asp) followed by a semicolon (;) followed by a random character plus an extension. Such as (cao.asp; ca.jpg) this file Windows will be used as a jpg image file, but this file will be run as asp in IIS, (cao.asp; ca.jpg) This file IIS will be recognized as (cao. Asp), after the semicolon, things are ignored - -. So the file name (cao.asp;.jpg) is also OK!

There is a picture in the patch package, put the law below each site, if anyone uses this vulnerability! Will see this picture!


Principle: In Windows, to search for multiple files is divided by a semicolon (;), if the file itself has a semicolon? - -. Haha system can not search for such files! The following picture shows that this file h.asp;kk.jpg will be searched as two files h.asp and kk.jpg in Windows search. This is a misdesign of Windows. It should be said that it should not be allowed. The semicolon (;) is the file name!


But you need to know that cdx, cer, etc. are all asp mappings! So aaa.cdx; kk.jpg will be run as asp! If these maps are not deleted, they will be used. With the above methods, these will become safe!



The following figure is an ASP directory vulnerability, as long as the directory name is xxxx.asp, all files under the directory will be run as asp files. This is the asp directory vulnerability


Silver Moon Remote, Silvermoon Network, Silvermoon Server Tools Tool.

Copyright © Windows knowledge All Rights Reserved