English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 134041 CVE descriptions
and 69903 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:10007
Category:Web application abuses
Title:ShowCode possible
Summary:Internet Information Server (IIS) 4.0 ships with a set of sample files to; help web developers learn about Active Server Pages (ASP). One of these; sample files, 'showcode.asp' (installed in /msadc/Samples/SELECTOR/), is; designed to view the source code of the sample applications via a web browser.; The 'showcode.asp' file does inadequate security checking and allows anyone; with a web browser to view the contents of any text file on the web server.; This includes files that are outside of the document root of the web server.;; The 'showcode.asp' file is installed by default at the URL:; http://www.YOURSERVER.com/msadc/Samples/SELECTOR/showcode.asp; It takes 1 argument in the URL, which is the file to view.; The format of this argument is: source=/path/filename;; This is a fairly dangerous sample file since it can view the contents of any ; other files on the system. The author of the ASP file added a security check to ; only allow viewing of the sample files which were in the '/msadc' directory on ; the system. The problem is the security check does not test for the '..'; characters within the URL. The only checking done is if the URL contains the; string '/msadc/'. This allows URLs to be created that view, not only files; outside of the samples directory, but files anywhere on the entire file; system that the web server's document root is on.;; The full description can be found at: http://www.l0pht.com/advisories.html
Description:Summary:
Internet Information Server (IIS) 4.0 ships with a set of sample files to
help web developers learn about Active Server Pages (ASP). One of these
sample files, 'showcode.asp' (installed in /msadc/Samples/SELECTOR/), is
designed to view the source code of the sample applications via a web browser.
The 'showcode.asp' file does inadequate security checking and allows anyone
with a web browser to view the contents of any text file on the web server.
This includes files that are outside of the document root of the web server.

The 'showcode.asp' file is installed by default at the URL:
http://www.YOURSERVER.com/msadc/Samples/SELECTOR/showcode.asp
It takes 1 argument in the URL, which is the file to view.
The format of this argument is: source=/path/filename

This is a fairly dangerous sample file since it can view the contents of any
other files on the system. The author of the ASP file added a security check to
only allow viewing of the sample files which were in the '/msadc' directory on
the system. The problem is the security check does not test for the '..'
characters within the URL. The only checking done is if the URL contains the
string '/msadc/'. This allows URLs to be created that view, not only files
outside of the samples directory, but files anywhere on the entire file
system that the web server's document root is on.

The full description can be found at: http://www.l0pht.com/advisories.html

Solution:
For production servers, sample files should never be installed, so
delete the entire /msadc/samples directory. If you must have the
'showcode.asp' capability on a development server, the 'showcode.asp' file
should be modified to test for URLs with '..' in them and deny those requests.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: BugTraq ID: 167
Common Vulnerability Exposure (CVE) ID: CVE-1999-0736
L0pht Security Advisory: May7,1999
Microsoft Security Bulletin: MS99-013
http://www.microsoft.com/technet/security/bulletin/ms99-013.asp
Microsoft Knowledge Base article: Q232449
Microsoft Knowledge Base article: Q231368
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A932
CopyrightThis script is Copyright (C) 1999 Immo Goltz

This is only one of 69903 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2018 E-Soft Inc. All rights reserved.