CVE-2004-1133
CVSS6.8
发布时间 :2005-01-10 00:00:00
修订时间 :2016-10-17 22:51:31
NMCOPS    

[原文]Multiple cross-site scripting (XSS) vulnerabilities in Microsoft W3Who ISAPI (w3who.dll) allow remote attackers to inject arbitrary HTML and web script via (1) HTTP headers such as "Connection" or (2) invalid parameters whose values are echoed in the resulting error message.


[CNNVD]Microsoft IIS w2who.dll 跨站脚本攻击漏洞(CNNVD-200501-088)

        Microsoft IIS w3who.dll是一款Web版的Whoami ISAPI库。
        w3who.dll存在多个跨站脚本攻击漏洞。
        远程攻击者可通过特殊的HTTP头或显示在错误信息中的无效参数,注入任意Web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 6.8 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1133
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1133
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200501-088
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=full-disclosure&m=110234486823233&w=2
(UNKNOWN)  FULLDISC  20041206 Multiple vulnerabilities in w3who ISAPI DLL
http://xforce.iss.net/xforce/xfdb/18375
(UNKNOWN)  XF  w3who-http-error-xss(18375)

- 漏洞信息

Microsoft IIS w2who.dll 跨站脚本攻击漏洞
中危 跨站脚本
2005-01-10 00:00:00 2007-01-02 00:00:00
远程  
        Microsoft IIS w3who.dll是一款Web版的Whoami ISAPI库。
        w3who.dll存在多个跨站脚本攻击漏洞。
        远程攻击者可通过特殊的HTTP头或显示在错误信息中的无效参数,注入任意Web脚本或HTML。

- 公告与补丁

        目前厂商还没有提供此漏洞的相关补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        http://www.microsfot.com
        注:Microsoft已删除了该组件

- 漏洞信息 (F35249)

Exaprobe Security Advisory 2004-12-06 (PacketStormID:F35249)
2004-12-12 00:00:00
Nicolas Gregoire,Exaprobe  exaprobe.com
advisory,overflow,xss
windows,2k
CVE-2004-1133,CVE-2004-1134
[点击下载]

Exaprobe Security Advisory - The w3who.dll in Windows 2000 is susceptible to multiple cross site scripting attacks and a buffer overflow.

Exaprobe
                         www.exaprobe.com

                         Security Advisory


 Advisory Name: Multiple vulnerabilities in w3who
  Release Date: 6 December 2004
   Application: Microsoft ISAPI extension w3who.dll
      Platform: Windows 2000/XP Resource Kit
      Severity: Remote code execution
        Author: Nicolas Gregoire <ngregoire@exaprobe.com>
 Vendor Status: Affected code is no more available
CVE Candidates: CAN-2004-1133 and CAN-2004-1135
     Reference: www.exaprobe.com/labs/advisories/esa-2004-1206.html


Overview :
==========

>>From the Windows 2000 Resource Kit documentation :

"W3Who is an Internet Server Application Programming Interface
(ISAPI) application dynamic-link library (DLL) that works within
a Web page to display information about the calling context of
the client browser and the configuration of the host server."


Details :
=========

There're two basic XSS vulnerabilities, and an easily exploitable
buffer-overflow.

XSS vulnerability when displaying HTTP headers :
Connection: keep-alive<script>alert("Hello")</script>

XSS vulnerability in error message :
/scripts/w3who.dll?bogus=<script>alert("Hello")</script>

Buffer overflow when called with long parameters :
/scripts/w3who.dll?AAAAAAAAA...[519 to 12571]....AAAAAAAAAAAAA


Vendor Response :
=================

After notification by Exaprobe, Microsoft choosed to remove
the web download of this component and do not have any plans
to issue an updated version.


Recommendation :
================

Restrict access to the DLL.
Do not use it on production servers. 


Related code :
==============

Thanks to HD Moore, a Metasploit plugin will be integrated in the
upcoming release of the Metasploit Framework.
A NASL script has been sent to Nessus developpers.


CVE Information :
=================

The Common Vulnerabilities and Exposures (CVE) project has assigned 
the following names to these issues.  These are candidates for 
inclusion in the CVE list (http://cve.mitre.org), which standardizes 
names for security problems.

  CAN-2004-1133  Cross-site scripting issues in w3who.dll
  CAN-2004-1134  Buffer-overflow in w3who.dll


-- 
Nicolas Gregoire ----- Consultant en S    

- 漏洞信息

12256
Microsoft W3Who ISAPI (w3who.dll) HTTP Connection Header XSS
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

- 时间线

2004-12-06 Unknow
2004-12-06 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Windows 2000 Resource Kit W3Who.DLL Multiple Remote Vulnerabilities
Boundary Condition Error 11820
Yes No
2004-12-06 12:00:00 2009-07-12 08:07:00
Nicolas Gregoire <ngregoire@exaprobe.com> is credited with the discovery of this issue.

- 受影响的程序版本

Microsoft w3who.dll
+ Microsoft Windows 2000 Resource Kit

- 漏洞讨论

The Microsoft Windows 2000 Resource Kit supports many utilities designed for diagnostic administration of the Windows platform. The w3who.dll library is a utility designed to provide auditing of server configuration remotely through a Web browser.

Multiple remote vulnerabilities affect the w3who.dll library of Microsoft's Windows Resource Kit. These issues are due to a failure of the library to properly sanitize and perform proper bounds checking on user-supplied input.

The first two issues are cross-site scripting vulnerabilities. The final issue is a buffer overflow vulnerability.

These issues may be exploited to conduct cross-site scripting attacks and execute arbitrary code with the privileges of the affected Web server. This may facilitate theft of cookie based authentication credentials, unauthorized access, privileges escalation other attacks.

- 漏洞利用

The following proof of concept exploits have been made available:

XSS vulnerability when displaying HTTP headers :
Connection: keep-alive&lt;script&gt;alert("Hello")&lt;/script&gt;

XSS vulnerability in error message :
http://www.example.com/scripts/w3who.dll?bogus=&lt;script&gt;alert("Hello")&lt;/script&gt;

Buffer overflow when called with long parameters :
http://www.example.com/scripts/w3who.dll?AAAAAAAAA...[519 to 12571]....AAAAAAAAAAAAA

An exploit for the w3who.dll buffer overflow has been released as part of the MetaSploit Framework 2.3.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站