[10860] in bugtraq
Microsoft Peer Web Services vulnerability
daemon@ATHENA.MIT.EDU (Colette.Chamberland@MAIL.STATE.KY.)
Fri Jun 18 13:48:02 1999
Mime-Version: 1.0
Content-Type: text/plain
Message-Id: <910433C0D10AD211BF1F0008C7F4D3CE023F65E8@agency6.state.ky.us>
Date: Thu, 17 Jun 1999 14:35:37 -0400
Reply-To: Colette.Chamberland@MAIL.STATE.KY.US
From: Colette.Chamberland@MAIL.STATE.KY.US
To: BUGTRAQ@NETSPACE.ORG
ADVISORY
6/17/1999
This advisory is for those that run "Microsoft Peer Web Services" in
addition to the
advisory for Microsoft's IIS 4. It also limits Web-based administration to
the loopback address
(127.0.0.1) by default. It also has the ism.dll in the /scripts/iisadmin
directory,
which allows users / attackers to access the ISAPI application used for
remote
web-based administration from an non-loopback IP address.
NOTE: An attacker can simply do a search on Alta Vista for "Microsoft Peer
Web Services".
They then get a complete list of NT Workstations running this service. All
they need to do,
is append the following to the End of the url:
/scripts/iisadmin/ism.dll?http/dir.
The user will then be prompted for a UserID and password and if successful
authentication takes place they are given access to sensitive server
information. It provides an attacker with a means to brute
force / guess the Administrators password and if successful an enormous
amount of reconnaissance work can be achieved through the application's use.
Colette Chamberland
http://www.mc2.nu