ISBASE Security Advisory(SA2000-02)
Topic: IIS ISM.DLL truncation exposes file content
Release Date: July 17, 2000
Microsoft Internet Information Server 4.0
Microsoft Internet Information Server 5.0
Windows NT 4.0 and Windows 2000
Isbase security team has found a security flaw in Microsoft IIS 4.0/5.0 .
Attacker can obtain the contents of certain types of files (.asp,.asa,.iniβ¦)
in Microsoft Internet Information Server 4.0 or 5.0. Normally attacker should
not be able to access the contents of those files. Attacker could get some
sensitive data contained in those files.
By requesting an existing filename (for example, global.asa) with an appendage
of "+" and extention of ".htr" from Microsoft Internet Information Server
4.0/5.0 , IIS will be tricked to call ISM.DLL ISAPI application to deal with
this request. When "+" is found in the filename, ISM.DLL will truncate the
"+.htr" and open the target file(global.asa). If the target file is not ".htr"
file , part of target file source code will be exposed to the attacker. For
example, attacker can retrieve the content of global.asa which often contains
some sensitive information such as SQL server's username and password.
Put this URL in your browser and view the source code of returned page:
http://www.victim.com/global.asa+.htr
If you don't need HTR functionality , remove the script mapping for HTR.
Microsoft has been informed and released one security bulletin concerning this
flaw.
The bulletin is live at :
http://www.microsoft.com/technet/security/bulletin/MS00-044.asp
Patches are available at:
IIS 4.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=22709
IIS 5.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=22708
Isbase Security Team <[email protected]>
ISBASE INFORMATION TECHNOLOGY CO.,LTD
(http://www.isbase.com)