CVE-2001-0986
CVSS5.0
发布时间 :2001-09-14 00:00:00
修订时间 :2008-09-05 16:25:24
NMCOES    

[原文]SQLQHit.asp sample file in Microsoft Index Server 2.0 allows remote attackers to obtain sensitive information such as the physical path, file attributes, or portions of source code by directly calling sqlqhit.asp with a CiScope parameter set to (1) webinfo, (2) extended_fileinfo, (3) extended_webinfo, or (4) fileinfo.


[CNNVD]Microsoft Index Server 2.0 文件和路径信息泄露漏洞(CNNVD-200109-050)

        CVE(CAN) ID: CAN-2001-0986
        
        
        
        Microsoft Index Server中有一个样本程序"sqlqhit.asp",用于演示基于Web的数据
        
        库查询,该程序位于"\inetpub\iissamples\ISSamples\"目录下,且是缺省安装的。
        
        
        
        通过向该程序发送一个精心构造的请求,可能导致物理路径,文件属性,甚至是部分文
        
        件内容泄露。
        
        
        
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0986
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0986
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200109-050
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/archive/1/214217
(VENDOR_ADVISORY)  BUGTRAQ  20010914 Security Vulnerability with Microsoft Index Server 2.0(Sample file reveals file info, physical path etc)
http://xforce.iss.net/static/7125.php
(VENDOR_ADVISORY)  XF  winnt-indexserver-sqlqhit-asp(7125)
http://www.securityfocus.com/bid/3339
(VENDOR_ADVISORY)  BID  3339

- 漏洞信息

Microsoft Index Server 2.0 文件和路径信息泄露漏洞
中危 设计错误
2001-09-14 00:00:00 2006-09-01 00:00:00
远程  
        CVE(CAN) ID: CAN-2001-0986
        
        
        
        Microsoft Index Server中有一个样本程序"sqlqhit.asp",用于演示基于Web的数据
        
        库查询,该程序位于"\inetpub\iissamples\ISSamples\"目录下,且是缺省安装的。
        
        
        
        通过向该程序发送一个精心构造的请求,可能导致物理路径,文件属性,甚至是部分文
        
        件内容泄露。
        
        
        
        

- 公告与补丁

        我们建议你删除"iissamples"目录
        
        
        
        厂商补丁:
        
        
        
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商
        
        的主页以获取最新版本:
        
        
        http://www.microsoft.com/

        
        
        

- 漏洞信息 (21113)

Microsoft Index Server 2.0 File Information and Path Disclosure Vulnerability (EDBID:21113)
windows remote
2001-09-14 Verified
0 Syed Mohamed
N/A [点击下载]
source: http://www.securityfocus.com/bid/3339/info

The sqlqhit.asp sample file is used for performing web-based SQL queries.

Malicious users could send specifically crafted HTTP request to an Internet Information Services server running Index Server to reveal path information, file attributes, and possibly some lines of the file contents.

The sqlqhit.asp file is located in the \inetpub\iissamples\ISSamples\ folder and is installed by default. 

http://local-iis-server/iissamples/ISSamples/SQLQHit.asp?CiColumns=*&CiScope=webinfo

http://local-iis-server/iissamples/ISSamples/SQLQHit.asp?CiColumns=*&CiScope=extended_fileinfo

http://local-iis-server/iissamples/ISSamples/SQLQHit.asp?CiColumns=*&CiScope=extended_webinfo

http://local-iis-server/iissamples/ISSamples/SQLQHit.asp?CiColumns=*&CiScope=fileinfo 		

- 漏洞信息

636
Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

- 时间线

2001-09-14 Unknow
2001-09-14 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Index Server 2.0 File Information and Path Disclosure Vulnerability
Design Error 3339
Yes No
2001-09-14 12:00:00 2009-07-11 07:56:00
This vulnerability was discovered and posted to BugTraq by Syed Mohamed A <SyedMA@innerframe.com>.

- 受影响的程序版本

Microsoft Index Server 2.0
+ Microsoft IIS 4.0
+ Microsoft IIS 4.0

- 漏洞讨论

The sqlqhit.asp sample file is used for performing web-based SQL queries.

Malicious users could send specifically crafted HTTP request to an Internet Information Services server running Index Server to reveal path information, file attributes, and possibly some lines of the file contents.

The sqlqhit.asp file is located in the \inetpub\iissamples\ISSamples\ folder and is installed by default.

- 漏洞利用

Some samples of the HTTP requests submitted by Syed Mohamed A &lt;SyedMA@innerframe.com&gt; follow:

http://local-iis-server/iissamples/ISSamples/SQLQHit.asp?CiColumns=*&amp;CiScope=webinfo

http://local-iis-server/iissamples/ISSamples/SQLQHit.asp?CiColumns=*&amp;CiScope=extended_fileinfo

http://local-iis-server/iissamples/ISSamples/SQLQHit.asp?CiColumns=*&amp;CiScope=extended_webinfo

http://local-iis-server/iissamples/ISSamples/SQLQHit.asp?CiColumns=*&amp;CiScope=fileinfo

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站