[22564] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Microsoft Security Bulletin MS01-047

daemon@ATHENA.MIT.EDU (Craig Boston)
Fri Sep 7 17:41:07 2001

Date: Fri, 7 Sep 2001 14:55:40 -0500 (CDT)
From: Craig Boston <craig@wmhza.gank.org>
To: H D Moore <hdm@secureaustin.com>
Cc: bugtraq@securityfocus.com
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; CHARSET=US-ASCII
Content-Disposition: INLINE
In-Reply-To: <20010907005504.8679.qmail@securityfocus.com>
Reply-To: craig@wmhza.gank.org
Message-Id: <20010907195528.0020E62B1@mail.gank.org>

On Thu, 6 Sep 2001 19:54:58 -0500 H D Moore <hdm@secureaustin.com> wrote:

> I thought this was a feature ;)
>
> To dump the complete GAL:
> http://exchangesvr/exchange/finduser/fumsg.asp

I tried this on my 5.5 SP4 server with OWA.  I replaced http with https as
I have IIS configured to only allow encrypted access to the /exchange tree
and got redirected back to the logon screen since I didn't have a session cookie.

> If you get redirected back to the logon page immediately, it means that you 
> must establish a session with your browser first.  To do that, just browse to:
>
> http://exchangesvr/exchange/LogonFrm.asp?mailbox=&isnewwindow=0

This request gets me a blank page with a javascript popup saying "This page
has been disabled, please see your administrator."  I got an ASPSESSIONID
cookie, however the first URL still redirects me back to the logon page.  I
encountered similar results with Aviram Jenik's method.

My guess is this is because I have disabled anonymous access to public
folders.  I'm not 100% sure but it would appear at first glance that this
provides some protection against the GAL enumeration exploit.

Exchange Administrator, Site/Configuration/Protocols/HTTP and uncheck both
boxes about anonymous access.  Probably a good idea anyway if you have no
public folders that need to be accessed anonymously.

--
Craig Boston, CCNA
Network Administrator
Owen Oil Tools, Inc.


home help back first fref pref prev next nref lref last post