Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> ShowCode possible


Vulnerability Assessment Details

ShowCode possible

Vulnerability Assessment Summary
Acertains the presence of showcode.asp

Detailed Explanation for this Vulnerability Assessment

Internet Information Server (IIS) 4.0 ships with a set of sample files to
help web developers learn about Active Server Pages (ASP). One of these
sample files, 'showcode.asp' (installed in /msadc/Samples/SELECTOR/), is
designed to view the source code of the sample applications via a web

browser.
The 'showcode.asp' file does inadequate security checking and permits anyone
with a web browser to view the contents of any text file on the web server.
This includes files that are outside of the document root of the web server.

The 'showcode.asp' file is installed by default at the URL:
http://www.YOURSERVER.com/msadc/Samples/SELECTOR/showcode.asp
It takes 1 argument in the URL, which is the file to view.
The format of this argument is: source=/path/filename

This is a fairly dangerous sample file since it can view the contents of any
other files on the system. The author of the ASP file added a security check to
only permit viewing of the sample files which were in the '/msadc' directory on
the system. The problem is the security check does not test for the '..'
characters within the URL. The only checking done is if the URL contains the
string '/msadc/'. This permits URLs to be created that view, not only files
outside of the samples directory, but files anywhere on the entire file
system that the web server's document root is on.

The full description can be found at: http://www.l0pht.com/advisories.html

Solution : For production servers, sample files should never be installed, so
delete the entire /msadc/samples directory. If you must have the
'showcode.asp' capability on a development server, the 'showcode.asp' file
should be modified to test for URLs with '..' in them and deny those requests.

Network Security Threat Level: High

Networks Security ID: 167

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Immo Goltz

Cables, Connectors

Intel 2/4U Premium Mounting Rail Kit For Server Axxfullrail
$131.73
Intel 2/4U Premium Mounting Rail Kit For Server Axxfullrail  picture8x 8GB (64GB) SKhynix HP 647651-081 8GB 1Rx4 PC3-12800R DDR3 DIMM Server Memory
$88.0
8x 8GB (64GB) SKhynix HP 647651-081 8GB 1Rx4 PC3-12800R DDR3 DIMM Server Memory pictureDell PowerEdge R720 8Bay 2.5 Server 2x E5-2690 V2 3.GHz 10C 512GB RAM 2x 1TB SSD
$3147.2
Dell PowerEdge R720 8Bay 2.5 Server 2x E5-2690 V2 3.GHz 10C 512GB RAM 2x 1TB SSD pictureDell Seagate 2.5" 300GB 15K 64MB 6Gb/s SAS Server Hard Drive H8DVC ST9300653SS
$11.99
Dell Seagate 2.5


Discussions

No Discussions have been posted on this vulnerability.