Vulnerability cause: Access verification error
Hazard level: low
Affected System: Microsoft IIS 5.1
Hazard: Remote attackers can exploit this vulnerability to bypass authentication and access protected files.
Attack conditions: attackers must access Microsoft IIS 5.1.
Vulnerability Information
Microsoft IIS is an HTTP service program developed by Microsoft.
Basic authentication for directories has errors. Use ntfs ads (Alternate Data Streams) to open a protected folder, bypass all IIS authentication methods, and add ": $ i30: $ INDEX_ALLOCATION "can bypass verification. For example, the protected folder named "AuthNeeded" contains "secretfile. asp script, you can use "/AuthNeeded: $ i30: $ INDEX_ALLOCATION/secretfile. asp replaces/AuthNeeded/secretfile. asp to run "secretfile. asp ".
Test method: http://wwww.example.com/AuthNeeded:$i30:$INDEX_ALLOCATION/secretfile.asp
Http://www.xuwen.gov.cn/nethd/gao:$I30:$Index_Allocation/
Vendor solutions
You can refer to the security patches provided by the following vendors:
Microsoft IIS 5.1
Microsoft Security Update for Windows XP (KB2290570)
Http://www.microsoft.com/downloads/en/details.aspx? Familyid = AE55787E-4 A5C-48D5-AEDF-0ABADA514938 & displaylang = en
Vulnerability message Link
Http://soroush.secproject.com/downloadable/IIS5.1_Authentication_Bypass.pdf
Http://soroush.secproject.com/blog/2010/07/iis5-1-directory-authentication-bypass-by-using-i30index_allocation/
Http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx
Vulnerability Message Title
IIS 5.1 Directory Authentication Bypass
IIS5.1 Directory Authentication Bypass by using: $ I30: $ Index_Allocation
Microsoft Security Bulletin MS10-065-Important