Vulnerabilities > CVE-1999-0278 - Unspecified vulnerability in Microsoft Internet Information Server and Windows NT

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
microsoft
nessus
exploit available

Summary

In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL.

Exploit-Db

descriptionMicrosoft IIS 3.0/4.0,Microsoft Personal Web Server 2.0/3.0/4.0 ASP Alternate Data Streams Vulnerability. CVE-1999-0278. Remote exploits for multiple platform
idEDB-ID:19118
last seen2016-02-02
modified1998-01-01
published1998-01-01
reporterPaul Ashton
sourcehttps://www.exploit-db.com/download/19118/
titleMicrosoft IIS 3.0/4.0,Microsoft Personal Web Server 2.0/3.0/4.0 ASP Alternate Data Streams Vulnerability

Nessus

NASL familyWeb Servers
NASL idASP_SOURCE_DATA.NASL
descriptionIt is possible to get the source code of a remote ASP script by appending
last seen2020-06-01
modified2020-06-02
plugin id10362
published2000-04-10
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10362
titleMicrosoft IIS ASP::$DATA ASP Source Disclosure
code
#
# This script was written by Renaud Deraison <[email protected]>
#
# See the Nessus Scripts License for details
#
#


include("compat.inc");

if(description)
{
 script_id(10362);
 script_version ("1.39");
 script_cvs_date("Date: 2018/11/15 20:50:25");

 script_cve_id("CVE-1999-0278");
 script_bugtraq_id(149);
 script_xref(name:"MSFT", value: "MS98-003");
 script_xref(name:"MSKB", value:"188806");

 script_name(english:"Microsoft IIS ASP::$DATA ASP Source Disclosure");
 script_summary(english:"downloads the source of ASP scripts");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by an information disclosure flaw." );
 script_set_attribute(attribute:"description", value:
"It is possible to get the source code of a remote ASP script by
appending '::$DATA' to the end of the request.  ASP source code may
contain sensitive information such as logins, passwords and server
information." );
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/1998/ms98-003" );
 script_set_attribute(attribute:"solution", value:
"Apply the hotfixes referenced in the vendor advisory above." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2000/04/10");
 script_set_attribute(attribute:"vuln_publication_date", value: "1998/07/01");

 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"exploited_by_nessus", value:"true");
  script_end_attributes();

 script_category(ACT_ATTACK);
 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english:"Web Servers");

 script_dependencies("find_service1.nasl", "webmirror.nasl", "http_version.nasl", "www_fingerprinting_hmap.nasl");
 script_require_ports("Services/www", 80);
 script_require_keys("www/ASP");
 exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80, asp:TRUE);

function check(file)
{
  local_var w, r, report;

  w = http_send_recv3(method:"GET",item:string(file, "::$DATA"), port:port, exit_on_fail:TRUE);
  r = strcat(w[0], w[1], '\r\n', w[2]);
  if(
    "Content-Type: application/octet-stream" >< r && 
    "<%" >< r && 
    "Bad Request" >!< r 
  )
  {
    if (report_verbosity > 0)
    {
      report = 
        '\n' + "Nessus was able to retrieve the source of '" + file + "' by sending" +
        '\nthe following request :' +
        '\n' +
        '\n  ' + build_url(port:port, qs:file+'::$DATA') + '\n';

      if (report_verbosity > 1)
      {
        report += 
          '\nHere it is :' +
          '\n' +
          '\n' + crap(data:"-", length:30) + " snip " + crap(data:"-", length:30) + 
          '\n' + w[2] +
          crap(data:"-", length:30) + " snip " + crap(data:"-", length:30) + '\n';
      }
      security_warning(port:port, extra:report);
    }
    else security_warning(port);
    return(1);
  }
  return(0);
}


if(check(file:"/default.asp"))exit(0);
files = get_kb_list(string("www/", port, "/content/extensions/asp"));
if(isnull(files))exit(0);
files = make_list(files);
check(file:files[0]); 

Oval

accepted2011-05-16T04:03:36.138-04:00
classvulnerability
contributors
  • nameChristine Walzer
    organizationThe MITRE Corporation
  • nameRobert L. Hollis
    organizationThreatGuard, Inc.
  • nameShane Shaffer
    organizationG2, Inc.
  • nameSudhir Gandhe
    organizationTelos
  • nameShane Shaffer
    organizationG2, Inc.
descriptionIn IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL.
familywindows
idoval:org.mitre.oval:def:913
statusaccepted
submitted2004-05-04T12:00:00.000-04:00
titleIIS ASP Source Code Access Vulnerability
version33