cmdasp.asp & unicode

From: César González (cesar@eureka-sistemas.com)
Date: Thu Aug 16 2001 - 04:28:17 PDT

  • Next message: Marc Mosko: "Re: Emulating a wireless access point"

    Hello all,
    
    First of all, Thankx H.D. Moore for the reply to my last post ("Imformation 
    about mkilog.exe") and sorry about my poor english ;).  
    I am finishing a pen-test to a company and my customer said to me to try to 
    grab te data of the database.  The machine who runs the databas soft, runs 
    IIS too, and it ts vulnerable to an UNICODE exploit. I have uploaded the 
    cmdasp.asp script but it seems to fail in some operations like deleting 
    files.  For example : I upload cmdasp.asp to c:\inetpub\scripts\ with the 
    tftp trick but when i try to delete the file itself i got permision denied. 
    The user under the script runs is  IUSR_SIVAC. (sivac is the database and the 
    name of the computer in the windows network)
    My questions are : ¿Why cant i delete the files i have uploaded to 
    c:\inetpub\scripts? The user SIVAC should be allowed... if i can write in the 
    directory i should be allowed to delete too, isnt it?. ¿Could I force to 
    change the user under the cmd.asp.asp runs?
    
    Thanks in advance.
    
    César González Revilla
    Eureka Sistemas S.L.
    C/ San Fernando 16 bajo
    39010 Santander
    
    http://www.eureka-sistemas.com/
    
    cesar@eureka-sistemas.com 
    
    -----BEGIN PGP PUBLIC KEY BLOCK-----
    Version: GnuPG v1.0.4 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
     
    mQGiBDsshKoRBADzt7m8nsYJ02l3Vh794IuBQITQ+Ks6anzdKrsAhb2WXoE3eICY
    gdi21727h9L4bJAHwBGf0//zTMbKXYSRBfB8qi2LkJpam/zvdGi8jY7VmEiyOSnu
    aDhaXzXLY/K9QhVey8IS4N2D/taMYURvxsXdpslfwxKr2+C0gReL487LwwCgxgXo
    QZSPhgcqQH2T09bNDQzJWM0EAL5ohJlXoxG2LJKnw+1fRwwGhkHY/m5ZIk6KnPHx
    JjBLytAUYuGf+KapDOk1kGBOnnmGNOU/mvBe4/SpsfaIE9Dr1IwT7a566pNUTCjq
    SXXTWXbMPfQYg2fxC9Q6BnKY7ksLPes0tM8ZxTYPQbEgGS2kzRwDcNq1gI8df9Ij
    NTLdBACQXDy6RlE3Ruqzq2zHvYW5Bw8J0O2A71JUh/+/giF2J36pE4CP5kOQfXGO
    WHVf9EQMWRJILjLrYJuxz7MTIoaneLCYsX+pQN85bllBvdBNpXMr6Gfl0/WDz34b
    RUYk1sfmfDj+s3bQdzkdUtB0GKHV5wyYXKiWjIufsC4jxizmT7RBQ2VzYXIgR29u
    emFsZXogUmV2aWxsYSAoQUtBIEJvbG9Ucm9uKSA8Y2VzYXJAZXVyZWthLXNpc3Rl
    bWFzLmNvbT6IVwQTEQIAFwUCOyyEqgULBwoDBAMVAwIDFgIBAheAAAoJEDA5nDye
    t7spk5AAnAqy+Yqd8FO/27umg3EvtjGUU+tjAJ9jaRBI1Bc/sb2Nq48+Vp9RT4VI
    1rkBDQQ7LIS6EAQAkK3BHsTfJM2PriGBhfkc3UK9pMLMd7hYeRmh8ZW0S3NBwul/
    PaD9luVIKRkJLJHElO4E5a4PMu27vBTSqPcdUKy5IeAD42WlaemU4bgTP0wCv7rU
    UJCbtaKkpl0m86AGqVBd/0mBwSQUKrcJmMfCskpA2LNUjibOvjPVWjmph8MAAwUD
    /1uLj+9Ptkkhuy7LGBfivMIu/DLmvRz4C/fYJi9GtiI2u7Drdb9C3vPop9zTTNWE
    5YV3H9oa6E8C/Pp63naT0Y3Nxl+8PJT/QF2BtGEqdaaswy96YL6Rodgdq5YImUIX
    szYY1IO8cglMfqsUHHhquZ+Ur9Y0mpPWzUNjls7Nz+M6iEYEGBECAAYFAjsshLoA
    CgkQMDmcPJ63uyk4oACfVLdOOcq0Pmp8g4u7nJWNP2kYhJ0An2q7IxBGPnWgXEcD
    Q4Qy6O0V86q4
    =y6jk
    -----END PGP PUBLIC KEY BLOCK-----
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    



    This archive was generated by hypermail 2b30 : Thu Aug 16 2001 - 07:40:56 PDT