CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

Microsoft Frontpage Server Extensions Path Disclosure Vulnerability

2016年9月26日 1226点热度 0人点赞 0条评论

漏洞类别:CGI漏洞等级:

漏洞信息

"shtml.exe" is a component of the Frontpage package. Microsoft IIS Versions 4.0 and 5.0 contain a vulnerability that may disclose the local path of HTML, HTM, ASP and SHTML files. Requesting a non-existent file from shtml.dll will result in an error message that discloses the full local path of the Web Root. This vulnerability can be exploited by performing a request such as:

http://www.example.org/_vti_bin/shtml.exe/non_existant_file.htm
http://www.example.org/_vti_bin/shtml.exe/non_existant_file.html
http://www.example.org/_vti_bin/shtml.exe/non_existant_file.shtml
http://www.example.org/_vti_bin/shtml.exe/non_existant_file.asp

The following versions are vulnerable:

  • Microsoft FrontPage 2000 Server Extensions Version 1.1 and prior (for FrontPage 2000.0, Windows 95/98/NT 4.0/NT 2000)
  • Microsoft FrontPage Server Extensions Module for Apache Version 3.0.43
  • Microsoft IIS Version 5.0 (for Windows NT, 2000)
  • Microsoft IIS Version 4.0 (for Windows NT 4.0, BackOffice 4.0/4.5)

Frontpage Extensions are also vulnerable to cross-scripting attacks. For more information, see Cert Advisory CA-2000-02. Basically, it's possible to use specially designed URLs to return user-specified content to the browser.

漏洞危害

Unauthorized user can retrieve the real path of the web server. This information can later be used in further attacks.

解决方案

This issue was fixed in Frontpage Server Extensions 2000 (for Windows 95/98/NT 4.0/NT 2000) Version 1.2. You can download a patch from Microsoft's Web site.

Virtual Patches:
Trend Micro Virtual Patching
Virtual Patch #1000784: MS IIS Frontpage Server Extensions Path Disclosure

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me