Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Subject: ISBASE Security Advisory(SA2000-02)
From: Warning3 (warning3MAIL.COM)
Date: Mon Jul 17 2000 - 21:15:56 CDT
- Next message: Jon Paul, Nollmann: "Re: CheckPoint FW1 BUG"
- Previous message: Aleph One: "New Allaire Security Zone Bulletins"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
ISBASE Security Advisory(SA2000-02)
Topic: IIS ISM.DLL truncation exposes file content
Release Date: July 17, 2000
Affected software version:
Microsoft Internet Information Server 4.0
Microsoft Internet Information Server 5.0
Windows NT 4.0 and Windows 2000
Isbase security team has found a security flaw in Microsoft IIS 4.0/5.0 .
Attacker can obtain the contents of certain types of files (.asp,.asa,.ini...)
in Microsoft Internet Information Server 4.0 or 5.0. Normally attacker should
not be able to access the contents of those files. Attacker could get some
sensitive data contained in those files.
By requesting an existing filename (for example, global.asa) with an appendage
of "+" and extention of ".htr" from Microsoft Internet Information Server
4.0/5.0 , IIS will be tricked to call ISM.DLL ISAPI application to deal with
this request. When "+" is found in the filename, ISM.DLL will truncate the
"+.htr" and open the target file(global.asa). If the target file is not ".htr"
file , part of target file source code will be exposed to the attacker. For
example, attacker can retrieve the content of global.asa which often contains
some sensitive information such as SQL server's username and password.
Put this URL in your browser and view the source code of returned page:
If you don't need HTR functionality , remove the script mapping for HTR.
Microsoft has been informed and released one security bulletin concerning this
The bulletin is live at :
Patches are available at:
Isbase Security Team <securityisbase.com>
ISBASE INFORMATION TECHNOLOGY CO.,LTD