File: 1073.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (69 lines) | stat: -rw-r--r-- 1,369 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
Rule:  

Sid:
1073

--

Summary:
This event is generated when an attempt is made to read web application
source code.

--
Impact:
Information gathering.

--
Detailed Information:
The webhits.exe sample program that comes with Microsoft Index Server in IIS
contains a vulnerability that allows the reading of web application source
code.

Sometimes web application source code contains highly sensitive information,
such as database passwords and information concerning backend setups.  This
could be a prelude to further attacks.

--
Affected Systems:
	Microsoft Index Server when deployed in conjunction with Microsoft IIS.

--
Attack Scenarios:
Attacker sends a simple URL like the following and then chooses which
file they want to view:
http://servername/scripts/samples/search/webhits.exe

--
Ease of Attack:
Simple. No exploit software required.

--
False Positives:
None Known.

--
False Negatives:
None Known

--
Corrective Action:
Remove the samples directory from the webserver.

Check the host for signs of compromise.

--
Contributors:
Original rule writer unknown
Original document author unkown
Sourcefire Vulnerability Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>
Alex Kirk <alex.kirk@sourcefire.com>

--
Additional References:

http://www.win2000mag.com/Articles/Index.cfm?ArticleID=475&pg=2

http://secinf.net/info/www/cgi-bugs.htm

--