[13626] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Disable Parent Paths

daemon@ATHENA.MIT.EDU (Gary Geisbert)
Tue Feb 1 14:18:14 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id:  <NDBBJLKPHKLEJDMHDBIOGENBCBAA.gary@newsletters.com>
Date:         Mon, 31 Jan 2000 15:48:57 -0500
Reply-To: gary@newsletters.com
From: Gary Geisbert <gary@NEWSLETTERS.COM>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <8F0F57AEE769D211B6410008C756E13B05A92F36@ntmailk.tandy.com>

>*snip*
>
>my question: What security hole/hack does this create if left enabled?.
>
> *snip*

That all depends on how well the box is already configured.. =/  However,
one of the most notable problems is with Allow Parent Paths enabled, an ASP
script using the FileSystemObject coupled with Server.MapPath(), can open up
the source for scripts/files (or even worse, write something into the other
scripts/files).

This was illustrated in an advisory released by l0pht a few months ago,
which used a script that IIS installs by default.  It used the sample file
(showcode.asp I believe) to open up files like global.asa, which could
reveal database user/pass's as well as all sorts of information.

Gary Geisbert
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Senior Systems Engineer      gary@newsletters.com
Newsletters.com              http://www.newsletters.com
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

home help back first fref pref prev next nref lref last post