发布时间 :2005-01-10 00:00:00
修订时间 :2016-10-17 22:51:31

[原文]Multiple cross-site scripting (XSS) vulnerabilities in Microsoft W3Who ISAPI (w3who.dll) allow remote attackers to inject arbitrary HTML and web script via (1) HTTP headers such as "Connection" or (2) invalid parameters whose values are echoed in the resulting error message.

[CNNVD]Microsoft IIS w2who.dll 跨站脚本攻击漏洞(CNNVD-200501-088)

        Microsoft IIS w3who.dll是一款Web版的Whoami ISAPI库。

- CVSS (基础分值)

CVSS分值: 6.8 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  FULLDISC  20041206 Multiple vulnerabilities in w3who ISAPI DLL
(UNKNOWN)  XF  w3who-http-error-xss(18375)

- 漏洞信息

Microsoft IIS w2who.dll 跨站脚本攻击漏洞
中危 跨站脚本
2005-01-10 00:00:00 2007-01-02 00:00:00
        Microsoft IIS w3who.dll是一款Web版的Whoami ISAPI库。

- 公告与补丁


- 漏洞信息 (F35249)

Exaprobe Security Advisory 2004-12-06 (PacketStormID:F35249)
2004-12-12 00:00:00
Nicolas Gregoire,Exaprobe

Exaprobe Security Advisory - The w3who.dll in Windows 2000 is susceptible to multiple cross site scripting attacks and a buffer overflow.


                         Security Advisory

 Advisory Name: Multiple vulnerabilities in w3who
  Release Date: 6 December 2004
   Application: Microsoft ISAPI extension w3who.dll
      Platform: Windows 2000/XP Resource Kit
      Severity: Remote code execution
        Author: Nicolas Gregoire <>
 Vendor Status: Affected code is no more available
CVE Candidates: CAN-2004-1133 and CAN-2004-1135

Overview :

>>From the Windows 2000 Resource Kit documentation :

"W3Who is an Internet Server Application Programming Interface
(ISAPI) application dynamic-link library (DLL) that works within
a Web page to display information about the calling context of
the client browser and the configuration of the host server."

Details :

There're two basic XSS vulnerabilities, and an easily exploitable

XSS vulnerability when displaying HTTP headers :
Connection: keep-alive<script>alert("Hello")</script>

XSS vulnerability in error message :

Buffer overflow when called with long parameters :
/scripts/w3who.dll?AAAAAAAAA...[519 to 12571]....AAAAAAAAAAAAA

Vendor Response :

After notification by Exaprobe, Microsoft choosed to remove
the web download of this component and do not have any plans
to issue an updated version.

Recommendation :

Restrict access to the DLL.
Do not use it on production servers. 

Related code :

Thanks to HD Moore, a Metasploit plugin will be integrated in the
upcoming release of the Metasploit Framework.
A NASL script has been sent to Nessus developpers.

CVE Information :

The Common Vulnerabilities and Exposures (CVE) project has assigned 
the following names to these issues.  These are candidates for 
inclusion in the CVE list (, which standardizes 
names for security problems.

  CAN-2004-1133  Cross-site scripting issues in w3who.dll
  CAN-2004-1134  Buffer-overflow in w3who.dll

Nicolas Gregoire ----- Consultant en S    

- 漏洞信息

Microsoft W3Who ISAPI (w3who.dll) HTTP Connection Header XSS
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

- 时间线

2004-12-06 Unknow
2004-12-06 Unknow

- 解决方案


Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Windows 2000 Resource Kit W3Who.DLL Multiple Remote Vulnerabilities
Boundary Condition Error 11820
Yes No
2004-12-06 12:00:00 2009-07-12 08:07:00
Nicolas Gregoire <> is credited with the discovery of this issue.

- 受影响的程序版本

Microsoft w3who.dll
+ Microsoft Windows 2000 Resource Kit

- 漏洞讨论

The Microsoft Windows 2000 Resource Kit supports many utilities designed for diagnostic administration of the Windows platform. The w3who.dll library is a utility designed to provide auditing of server configuration remotely through a Web browser.

Multiple remote vulnerabilities affect the w3who.dll library of Microsoft's Windows Resource Kit. These issues are due to a failure of the library to properly sanitize and perform proper bounds checking on user-supplied input.

The first two issues are cross-site scripting vulnerabilities. The final issue is a buffer overflow vulnerability.

These issues may be exploited to conduct cross-site scripting attacks and execute arbitrary code with the privileges of the affected Web server. This may facilitate theft of cookie based authentication credentials, unauthorized access, privileges escalation other attacks.

- 漏洞利用

The following proof of concept exploits have been made available:

XSS vulnerability when displaying HTTP headers :
Connection: keep-alive&lt;script&gt;alert("Hello")&lt;/script&gt;

XSS vulnerability in error message :;script&gt;alert("Hello")&lt;/script&gt;

Buffer overflow when called with long parameters :[519 to 12571]....AAAAAAAAAAAAA

An exploit for the w3who.dll buffer overflow has been released as part of the MetaSploit Framework 2.3.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考