Vulnerabilities > CVE-2003-0317 - Unspecified vulnerability in Iisprotect 2.1/2.2

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
iisprotect
nessus
exploit available

Summary

iisPROTECT 2.1 and 2.2 allows remote attackers to bypass authentication via an HTTP request containing URL-encoded characters.

Vulnerable Configurations

Part Description Count
Application
Iisprotect
2

Exploit-Db

descriptionIISProtect 2.1/2.2 Authentication Bypass Vulnerability. CVE-2003-0317. Remote exploit for windows platform
idEDB-ID:22631
last seen2016-02-02
modified2003-05-22
published2003-05-22
reporteriDefense
sourcehttps://www.exploit-db.com/download/22631/
titleIISProtect 2.1/2.2 - Authentication Bypass Vulnerability

Nessus

NASL familyCGI abuses
NASL idIISPROTECT_BYPASS.NASL
descriptionThe remote host is running iisPROTECT, an IIS add-on to protect pages served by the web server. iisPROTECT is affected by an authentication bypass vulnerability due to a failure to recognize basic URL encoding. A remote attacher can exploit this, via hex-encoding requested URLs, to read sensitive files or directories.
last seen2020-06-01
modified2020-06-02
plugin id11663
published2003-05-28
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11663
titleiisPROTECT Encoded URL Authentication Bypass
code
#
# (C) Tenable Network Security, Inc.
#

# Note that we need to be authenticated for this check
# to work properly.
#

include("compat.inc");

if(description)
{
  script_id(11663);
  script_version("1.27");
  script_cvs_date("Date: 2018/11/15 20:50:17");

  script_cve_id("CVE-2003-0317");
  script_bugtraq_id(7661);
  script_xref(name:"Secunia", value:"8850");
  script_xref(name:"EDB-ID", value:"22631");

  script_name(english:"iisPROTECT Encoded URL Authentication Bypass");
  script_summary(english:"Determines if iisprotect can be escaped.");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains an application that is affected by an
authentication bypass vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote host is running iisPROTECT, an IIS add-on to protect pages
served by the web server. iisPROTECT is affected by an authentication
bypass vulnerability due to a failure to recognize basic URL encoding.
A remote attacher can exploit this, via hex-encoding requested URLs,
to read sensitive files or directories.");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/vulnwatch/2003/q2/82");
  script_set_attribute(attribute:"solution", value:
"Upgrade to iisPROTECT version 2.2.0.9.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2003/05/22");
  script_set_attribute(attribute:"patch_publication_date", value:"2003/05/22");
  script_set_attribute(attribute:"plugin_publication_date", value:"2003/05/28");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:iisprotect:iisprotect");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");

  script_dependencies("no404.nasl", "http_version.nasl", "webmirror.nasl");
  script_require_ports("Services/www", 80);

  exit(0);
}

# Check starts here
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

if (report_paranoia < 2)
{
  server_name = http_server_header(port:port);
  if (isnull(server_name))
    audit(AUDIT_WEB_BANNER_NOT, port);
  if ("iis/" >!< tolower(server_name))
    audit(AUDIT_WRONG_WEB_SERVER, port, "IIS");
}

no404 = get_kb_item("www/no404/"+port);
if (strlen(no404) > 0)
{
  if (report_paranoia < 1 || no404 == "HTTP")
    exit(1, "The web server on port "+port+" does not return 404 codes.");
}

function encode(dir)
{
  local_var enc, i;
  for(i=strlen(dir) - 2;i>1;i--)
  {
    if(dir[i] == "/")break;
  }
  if(i <= 1)return NULL;

  enc = "%" + hex(ord(dir[i+1])) - "0x";
  dir = insstr(dir, enc, i+1, i+1);
  return dir;
}
function check(loc)
{
  local_var w, res;
  disable_cookiejar();
  w = http_send_recv3(method:"GET", item:loc, port:port, exit_on_fail:TRUE);

  if (no404)
  {
    res = w[0] + w[1] + w[2];
    if (no404 >< res) return NULL;
  }
  res = w[0];
  enable_cookiejar();
  return res;
}

dirs = get_kb_list("www/"+port+"/content/auth_required");
if(!isnull(dirs)) dirs = make_list(dirs, "/iisprotect/sample/protected");
else dirs = make_list("/iisprotect/sample/protected");

foreach dir (dirs)
{
  resp_code = check(loc:dir);
  if (resp_code =~ "^HTTP/[0-9]\.[0-9] 40[13] ")
  {
    origdir = dir;
    orig_resp = resp_code;
    dir = encode(dir:dir);
    if (empty_or_null(dir))
      exit(0, "Unable to Hex encode the directory name");
    resp_code =  check(loc:dir);
    if(resp_code =~ "^HTTP/[0-9]\.[0-9] 200 ")
    {
      report =
        '\nNessus was able to verify this issue by sending the following'+
        '\nrequests :\n'+
        '\n' + build_url(qs:origdir, port:port) +
        '\nResponse code : ' + orig_resp +
        '\n' + build_url(qs:dir, port:port) +
        '\nResponse code : ' + resp_code +
        '\n';
      security_hole(port:port, extra:report);
      exit(0);
    }
  }
}
audit(AUDIT_WRONG_WEB_SERVER, port, "affected");

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/31145/05.22.03.txt
idPACKETSTORM:31145
last seen2016-12-05
published2003-05-23
reporteriDefense Labs
sourcehttps://packetstormsecurity.com/files/31145/iDEFENSE-Security-Advisory-2003-05-22.t.html
titleiDEFENSE Security Advisory 2003-05-22.t