Vulnerabilities > CVE-1999-0736 - Unspecified vulnerability in Microsoft Internet Information Server 4.0

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
microsoft
nessus
exploit available

Summary

The showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.

Vulnerable Configurations

Part Description Count
Application
Microsoft
1

Exploit-Db

descriptionMicrosoft IIS 4.0,Microsoft Site Server 3.0 Showcode ASP Vulnerability. CVE-1999-0736. Remote exploits for multiple platform
idEDB-ID:19129
last seen2016-02-02
modified1999-05-07
published1999-05-07
reporterL0pht
sourcehttps://www.exploit-db.com/download/19129/
titleMicrosoft IIS 4.0,Microsoft Site Server 3.0 Showcode ASP Vulnerability

Nessus

NASL familyCGI abuses
NASL idSHOWCODE.NASL
descriptionInternet Information Server (IIS) 4.0 ships with a set of sample files to help web developers learn about Active Server Pages (ASP). One of these sample files,
last seen2020-06-01
modified2020-06-02
plugin id10007
published1999-07-08
reporterThis script is Copyright (C) 1999-2018 Immo Goltz <[email protected]>
sourcehttps://www.tenable.com/plugins/nessus/10007
titleMicrosoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
code
#
# ShowCode ASP
#
# This plugin was written in C by Immo Goltz <[email protected]>
# and is released under the GPL
#
# - Description taken from  http://www.nessus.org/u?16ba761f
#
# Converted in NASL by Renaud Deraison <[email protected]>

# Changes by Tenable:
# - Converted in NASL  (RD)
# - Revised plugin title, desc formatting (4/3/2009)
# - Updated to use compat.inc (11/20/2009)

include("compat.inc");

if(description)
{
 script_id(10007);
 script_version ("1.42");
 script_cve_id("CVE-1999-0736");
 script_bugtraq_id(167);

 script_name(english:"Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access");
 
 script_set_attribute(attribute:"synopsis", value:
"It is possible to read arbitrary files on the remote host." );
 script_set_attribute(attribute:"description", value:
"Internet Information Server (IIS) 4.0 ships with a set of sample files to
help web developers learn about Active Server Pages (ASP). One of these
sample files, 'showcode.asp' (installed in /msadc/Samples/SELECTOR/), is
designed to view the source code of the sample applications via a web
browser.

The 'showcode.asp' file does inadequate security checking and allows anyone
with a web browser to view the contents of any text file on the web server.
This includes files that are outside of the document root of the web server.

The 'showcode.asp' file is installed by default at the URL:
http://www.YOURSERVER.com/msadc/Samples/SELECTOR/showcode.asp
It takes 1 argument in the URL, which is the file to view.
The format of this argument is: source=/path/filename

This is a fairly dangerous sample file since it can view the contents of any 
other files on the system. The author of the ASP file added a security check to 
only allow viewing of the sample files which were in the '/msadc' directory on 
the system. The problem is the security check does not test for the '..'
characters within the URL. The only checking done is if the URL contains the
string '/msadc/'. This allows URLs to be created that view, not only files
outside of the samples directory, but files anywhere on the entire file
system that the web server's document root is on." );
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?16ba761f" );
 script_set_attribute(attribute:"solution", value:
"For production servers, sample files should never be installed, so
delete the entire /msadc/samples directory. If you must have the
'showcode.asp' capability on a development server, the 'showcode.asp' file 
should be modified to test for URLs with '..' in them and deny those requests." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "1999/07/08");
 script_set_attribute(attribute:"vuln_publication_date", value: "1999/05/07");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"Determines the presence of showcode.asp");
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 1999-2020 Immo Goltz <[email protected]>");

 script_family(english:"CGI abuses");
 
 script_dependencie("find_service1.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 script_require_keys("www/ASP");
 exit(0);
}

#
# The script code starts here
#
include("http_func.inc");
include("http_keepalive.inc");

port = get_http_port(default:80, embedded:TRUE);
if ( ! can_host_asp(port:port) ) exit(0);


cgi = string("/msadc/Samples/SELECTOR/showcode.asp");
if ( is_cgi_installed_ka(item:cgi, port:port) )
 {
  item = "/msadc/Samples/SELECTOR/showcode.asp?source=/msadc/Samples/../../../../../winnt/win.ini";
  req = http_get(item:item, port:port);
  soc = http_open_socket(port);
  if(soc)
  {
   send(socket:soc, data:req);
   r = http_recv(socket:soc);
   http_close_socket(soc);
   r = tolower(r);
   if("[fonts]"  >< r){
	security_hole(port);
	}
   exit(0);
  }
 }

  

Oval

accepted2004-06-30T12:00:00.000-04:00
classvulnerability
contributors
nameChristine Walzer
organizationThe MITRE Corporation
descriptionThe showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
familywindows
idoval:org.mitre.oval:def:932
statusaccepted
submitted2004-05-17T12:00:00.000-04:00
titleIIS showcode.asp Sample File Vulnerability
version64