重点关注
漏洞公告
恶意代码
Microsoft IIS 5.1 自带的例程代码可以用来查看例程脚本(/IISSAMPLES)目录...
CNCVE编号:CNCVE-20020089 CVE编号: 安全级别:高 漏洞中文描述: Microsoft IIS 5.1 自带的例程代码可以用来查看例程脚本(/IISSAMPLES)目录下的其他脚本的源代码。然而这个脚本(CodeBrws.asp)没有充分的过滤unicode的目录编码例如,攻击者可以用“%c0%ae%c0%ae”取代“..”,进行“..”目录遍历攻击来摆脱例程脚本目录的限制。 漏洞英文描述: Microsoft IIS 5.0 ships with a sample script that may be used to view the source code of other scripts in the sample scripts (/IISSAMPLES) directory. However, this script (CodeBrws.asp) does not adequately filter unicode representations of directory traversals. For example, an attacker can break out of the sample script directory by substituting '%c0%ae%c0%ae' for '..' in a dot-dot-slash directory traversal attack. It has been demonstrated that this issue may be exploited to map out the directory structure of the filesystem on a host running the vulnerable script. 漏洞参考: http://online.securityfocus.com/bid/4525/info/ 系统类型: Unix/Linux Win95/98/ME Win2000/NT 漏洞类型:权限有效性检查错误