exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

asb00-07.hithighlight

asb00-07.hithighlight
Posted Jul 1, 2000
Site allaire.com

Allaire Security Bulletin (ASB00-07) - Microsoft has announced a vulnerability for Microsoft IIS which exposes the ability to use a malformed URL to read the source code of ASP, CFML, Perl and other files that are on a server. This is not a problem with ColdFusion Server itself, but it is an issue that can affect ColdFusion users.

tags | perl, asp
SHA-256 | a99ac1f1b065bd3b464ae979a2a401ccafdec0ed9a2a4b083c4b2d1f97479f6e

asb00-07.hithighlight

Change Mirror Download
Allaire Security Bulletin (ASB00-07)
Microsoft Internet Information Server Exposure of Source Code with Malformed Hit Highlighting Arguments

Last Revision: April 10, 2000

Summary
Microsoft has announced a vulnerability for Microsoft IIS which exposes the ability to use a malformed URL to read the source
code of ASP, CFML, Perl and other files that are on a server. This is not a problem with ColdFusion Server itself, but it is an issue
that can affect ColdFusion users. Allaire recommends that customers follow the instructions posted on the Microsoft Web site to
address this issue.

Issue
This issue is clearly explained in the Microsoft Knowledge Base: "The ISAPI filter that implements the hit-highlighting (also known
as "WebHits") functionality does not adequately constrain what files can be requested. If you provide a deliberately-malformed
argument in a request to hit-highlight a document, it is possible to escape the virtual folder. This can allow someone without
permissions to read any file residing on the same logical drive of the server that contains the Web Root folder. It does not allow
anyone without permissions to add or modify files." For example, accessing the URL:

https://www.yoursite.com/null.htw?CiWebHitsFile=/yourfile.asp%20&CiRestriction=none&CiHiliteType=Full

may yield the contents of the file normally available at https://www.yoursite.com/yourfile.asp itself, not the processed results of the
file.

Affected Software Versions

Any ColdFusion Server running on Microsoft Windows NT Server 4.0 or Microsoft Windows 2000

What Allaire is Doing
This is not an Allaire product. We are recommending that customers reference the information at Microsoft's site to address this
issue.


What Customers Should Do
There are several patches and workarounds available to correct this problem. These are detailed in the following Microsoft
Knowledge base article (Q251170):

https://www.microsoft.com/technet/support/kb.asp?ID=251170

Please note: this issue and patch may not be required for all IIS users. Allaire customers should review all material in
the Microsoft Security Bulletin and related documents carefully before applying the patch. As always, customers should
test patch changes in a testing environment before modifying production servers.

Revisions
April 10, 2000 -- Bulletin first released.

Reporting Security Issues
Allaire is committed to addressing security issues and providing customers with the information on how they can protect
themselves. If you identify what you believe may be a security issue with an Allaire product, please send an email to
secure@allaire.com. We will work to appropriately address and communicate the issue.

Receiving Security Bulletins
When Allaire becomes aware of a security issue that we believe significantly affects our products or customers, we will notify
customers when appropriate. Typically this notification will be in the form of a security bulletin explaining the issue and the
response. Allaire customers who would like to receive notification of new security bulletins when they are released can sign up for
our security notification service.

For additional information on security issues at Allaire, please visit the Security Zone at:
https://www.allaire.com/security

THE INFORMATION PROVIDED BY ALLAIRE IN THIS BULLETIN IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. ALLAIRE DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN
NO EVENT SHALL ALLAIRE CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF ALLAIRE CORPORATION OR ITS SUPPLIERS HAVE
BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close