what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

A100400-1

A100400-1
Posted Oct 5, 2000
Authored by Mnemonix | Site atstake.com

Atstake Security Advisory - Microsoft's Internet Information Server 5.0 is WebDAV (RFC 2518) enabled. As part of the extra functionality provided by the WebDAV components. Microsoft has introduced the SEARCH request method to enable searching for files based upon certain criteria. This functionality can be exploited to gain what are equivalent to directory listings. These directory listings can be used by an attacker to locate files in the web directories that are not normally exposed through links on the web site. .inc files and other components of ASP applications that potentially contain sensitive information can be viewed this way.

tags | web, asp
SHA-256 | f2562bfaf09eac881c34bf6c3fc7b51eb464aca2b3cb81446d72d5bf1fc82e7c

A100400-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


@stake, Inc.
www.atstake.com

Security Advisory


Advisory Name: Unauthorized "Directory Listings" under IIS 5.0
Release Date: 10/04/2000
Application: Internet Information Server 5.0
Platform: Windows 2000
Severity: An attacker can enumerate files in directories
Author: mnemonix (dlitchfield@atstake.com)
Vendor Status: Vendor has issued KB article
Web: www.atstake.com/research/advisories/2000/a100400-1.txt


Overview:

Microsoft's Internet Information Server 5.0 is WebDAV (RFC 2518)
enabled. As part of the extra functionality provided by the WebDAV
components. Microsoft has introduced the SEARCH request method to enable
searching for files based upon certain criteria. This functionality can be
exploited to gain what are equivalent to directory listings. These
directory listings can be used by an attacker to locate files in the web
directories that are not normally exposed through links on the web site.
.inc files and other components of ASP applications that potentially
contain sensitive information can be viewed this way.

For a SEARCH request to succeed the Index Service must be running
and read access must be given to the directory being searched. By default
all directories are indexed, however, by default, the Index Service is not
started.

Therefore those at risk from this particular issue are those
running IIS 5.0 with the Index Server service running.


Detailed Description:

By making a request similar to:

SEARCH / HTTP/1.1
Host: 127.0.0.1
Content-Type: text/xml
Content-Length: 133

<?xml version="1.0"?>
<g:searchrequest xmlns:g="DAV:">
<g:sql>
Select "DAV:displayname" from scope()
</g:sql>
</g:searchrequest>

It is possible to gain a directory listing of the root directory and every
sub-directory. The impact of this is such that attackers may be able to
discover "hidden" files or enumerate .inc files used in ASP applications
and then directly download them. .inc files can contain sensitive
information such as database login names and passwords.



Solution:

If you don't use the Index Server service then it should be
disabled. This will prevent this issue.

If you do use it place any files that may be considered as
sensitive in a directory that is not indexed or that has had the read
permission removed from it.

Vendor Response:

Microsoft has written a KB article about this issue. More can be
found at:

http://www.microsoft.com/technet/support/kb.asp?ID=272079

Conclusion:

We feel that Microsoft has documented the issue well in this KB
article, however, many IIS5 and Index Server users do not know of this
WebDAV functionality that is exposing their file listings. Therefore we
feel hightened awareness of this issue is warranted.

For more advisories: http://www.atstake.com/research/advisories/
PGP Key: http://www.atstake.com/research/pgp_key.asc

Copyright 2000 @stake, Inc. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0

iQA/AwUBOdugsFESXwDtLdMhEQJ5egCcCw2TyPVoox+L2gGmibsNaX8kT04An100
b3+/qM4H6OKl/IYT4zACS6WH
=GK3c
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close