TUCoPS :: Web :: IIS :: iis71~1.txt

IIS - ISM.DLL vulnerability




    IIS 4, 5


    Following is based on  ISBASE Security Advisory.   Isbase security
    team has found a security flaw in Microsoft  IIS 4.0/5.0. Attacker
    can obtain the contents of certain types of files  (.asp,.asa,.ini
    ...)  in  Microsoft  Internet  Information  Server  4.0  or   5.0.
    Normally attacker  should not  be able  to access  the contents of
    those files.  Attacker could get some sensitive data contained  in
    those files.

    By requesting an existing filename (for example, global.asa)  with
    an  appendage  of  "+"  and  extention  of  ".htr"  from Microsoft
    Internet Information Server 4.0/5.0 , IIS will be tricked to  call
    ISM.DLL ISAPI application to deal with this request.  When "+"  is
    found in the filename, ISM.DLL will truncate the "+.htr" and  open
    the target file(global.asa). If the target file is not ".htr" file
    part of target file source  code will be exposed to  the attacker.
    For example, attacker can retrieve the content of global.asa which
    often contains  some sensitive  information such  as SQL  server's
    username and password.

    Put this URL in your browser and view the source code of  returned



    If you don't  need HTR functionality  , remove the  script mapping
    for HTR.  Patches are available at:

        IIS 4.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=22709
        IIS 5.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=22708

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH