Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.10007
Categoría:Web application abuses
Título:Microsoft IIS 'showcode.asp' Default File Directory Traversal Vulnerability - Active Check
Resumen:Internet Information Server (IIS) 4.0 ships with a set of sample; files to help web developers learn about Active Server Pages (ASP). One of this sample file is; prone to a directory traversal vulnerability.
Descripción:Summary:
Internet Information Server (IIS) 4.0 ships with a set of sample
files to help web developers learn about Active Server Pages (ASP). One of this sample file is
prone to a directory traversal vulnerability.

Vulnerability Insight:
One of these sample files, 'showcode.asp' (installed in
/msadc/Samples/SELECTOR/), is designed to view the source code of the sample applications via a
web browser.

The 'showcode.asp' file does inadequate security checking and allows anyone with a web browser to
view the contents of any text file on the web server. This includes files that are outside of the
document root of the web server.

The 'showcode.asp' file is installed by default at the URL:

http://www.example.com/msadc/Samples/SELECTOR/showcode.asp

It takes 1 argument in the URL, which is the file to view. The format of this argument is:
source=/path/filename

This is a fairly dangerous sample file since it can view the contents of any other files on the
system. The author of the ASP file added a security check to only allow viewing of the sample
files which were in the '/msadc' directory on the system. The problem is the security check does
not test for the '..' characters within the URL. The only checking done is if the URL contains the
string '/msadc/'. This allows URLs to be created that view, not only files outside of the samples
directory, but files anywhere on the entire file system that the web server's document root is on.

The full description can be found at the referenced link.

Solution:
For production servers, sample files should never be installed,
so delete the entire /msadc/samples directory. If you must have the 'showcode.asp' capability on a
development server, the 'showcode.asp' file should be modified to test for URLs with '..' in them
and deny those requests.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-1999-0736
L0pht Security Advisory: May7,1999
Microsoft Security Bulletin: MS99-013
https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-013
Microsoft Knowledge Base article: Q231368
Microsoft Knowledge Base article: Q232449
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A932
CopyrightCopyright (C) 1999 Immo Goltz

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.