ID

VAR-200906-0272


CVE

CVE-2009-1535


TITLE

Microsoft IIS WebDAV Remote Authentication Bypass

Trust: 0.8

sources: CERT/CC: VU#787932

DESCRIPTION

The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.0 allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a %c0%af (Unicode / character) at an arbitrary position in the URI, as demonstrated by inserting %c0%af into a "/protected/" initial pathname component to bypass the password protection on the protected\ folder, aka "IIS 5.1 and 6.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1122. Microsoft Internet Information Service (IIS) is prone to multiple authentication-bypass vulnerabilities because the application fails to properly enforce access restrictions on certain requests to password-protected WebDAV folders. An attacker can exploit these issues to gain unauthorized access to protected WebDAV resources, which may lead to other attacks. This issue affects IIS 5.0, 5.1, and 6.0. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA09-160A Microsoft Updates for Multiple Vulnerabilities Original release date: June 09, 2009 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Office * Microsoft Internet Explorer Overview Microsoft has released updates that address vulnerabilities in Microsoft Windows, Office, and Internet Explorer. I. Description As part of the Microsoft Security Bulletin Summary for June 2009, Microsoft released updates to address vulnerabilities that affect Microsoft Windows, Office, and Internet Explorer. II. Impact A remote, unauthenticated attacker could execute arbitrary code, gain elevated privileges, or cause a vulnerable application to crash. III. Solution Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for June 2009. The security bulletin describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. Administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). IV. References * Microsoft Security Bulletin Summary for June 2009 - <http://www.microsoft.com/technet/security/bulletin/ms09-jun.mspx> * Microsoft Windows Server Update Services - <http://technet.microsoft.com/en-us/wsus/default.aspx> * US-CERT Vulnerability Notes for Microsoft June 2009 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms09-jun> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA09-160A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA09-160A Feedback VU#983731" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2009 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History June 09, 2009: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBSi7EY3IHljM+H4irAQKpUwgAqcYG1SVf4dPt7wevUx9UIKyw/RWG/wCI +ns9UEmk4Pbdu8Tj+snDsNxxOnvdUGnWzfbuBFrzexr+u3zY0BgvBQ50eaYnYyVn Iv9yxxxKfdvQEQIiPi/5gWl05k4axYdSjEYLZqNkQIj1VvqJOhCWaHKPsJZykdZq ZZLd8aFxxM7fj0RrKeorXGiApw45kP9a133EN7NRf8CvYsNKnUTMYVPC2bTaq0Jb HCjjEOwBWaP6YjqQ1laVslCHzOVpFzQnkl+IKBsoDAu1397KjwobIR340YyW6K4g ckdod5TwdG77KOcNZHAp+uQMffGOaCfqj/MFk7qEYxN7/0gJXuB8mQ== =9e4w -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Are you missing: SECUNIA ADVISORY ID: Critical: Impact: Where: within the advisory below? This is now part of the Secunia commercial solutions. The vulnerability is caused due to an error when handling WebDAV requests for directories requiring authentication. This can be exploited to bypass access restrictions and e.g. download files from protected folders by issuing an HTTP GET request containing Unicode characters and a "Translate: f" HTTP header. Successful exploitation may allow uploading arbitrary files to protected WebDAV folders. The vulnerability is confirmed in Microsoft IIS 5.1 on a fully patched Windows XP SP3 and reported in version 6.0. Other versions may also be affected. SOLUTION: Do not store sensitive files inside the webroot. Disable WebDAV support. PROVIDED AND/OR DISCOVERED BY: Nikolaos Rangos (Kingcope) ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.88

sources: NVD: CVE-2009-1535 // CERT/CC: VU#787932 // JVNDB: JVNDB-2009-001542 // BID: 34993 // VULMON: CVE-2009-1535 // PACKETSTORM: 78216 // PACKETSTORM: 77606

AFFECTED PRODUCTS

vendor:microsoftmodel:iisscope:eqversion:6.0

Trust: 1.7

vendor:microsoftmodel:iisscope:eqversion:5.1

Trust: 1.7

vendor:microsoftmodel:internet information servicesscope:eqversion:6.0

Trust: 1.0

vendor:microsoftmodel:internet information servicesscope:eqversion:5.1

Trust: 1.0

vendor:microsoftmodel:iisscope:eqversion:5.0

Trust: 0.9

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(itanium)

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:sp3

Trust: 0.8

vendor:avayamodel:messaging application server mmscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:1.1

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:iisscope:neversion:7.0

Trust: 0.3

sources: CERT/CC: VU#787932 // BID: 34993 // JVNDB: JVNDB-2009-001542 // CNNVD: CNNVD-200906-166 // NVD: CVE-2009-1535

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-1535
value: HIGH

Trust: 1.0

NVD: CVE-2009-1535
value: 0

Trust: 0.8

NVD: CVE-2009-1535
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200906-166
value: HIGH

Trust: 0.6

VULMON: CVE-2009-1535
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-1535
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2009-1535
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:P/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: CERT/CC: VU#787932 // VULMON: CVE-2009-1535 // JVNDB: JVNDB-2009-001542 // CNNVD: CNNVD-200906-166 // NVD: CVE-2009-1535

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.8

sources: JVNDB: JVNDB-2009-001542 // NVD: CVE-2009-1535

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200906-166

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-200906-166

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001542

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2009-1535

PATCH

title:971492url:http://www.microsoft.com/technet/security/advisory/971492.mspx

Trust: 0.8

title:MS09-020url:http://www.microsoft.com/technet/security/bulletin/MS09-020.mspx

Trust: 0.8

title:971492url:http://www.microsoft.com/japan/technet/security/advisory/971492.mspx

Trust: 0.8

title:MS09-020url:http://www.microsoft.com/japan/technet/security/bulletin/MS09-020.mspx

Trust: 0.8

title:MS09-020eurl:http://www.microsoft.com/japan/security/bulletins/MS09-020e.mspx

Trust: 0.8

title:TA09-160Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta09-160a.html

Trust: 0.8

title:WindowsElevationurl:https://github.com/Al1ex/WindowsElevation

Trust: 0.1

sources: VULMON: CVE-2009-1535 // JVNDB: JVNDB-2009-001542

EXTERNAL IDS

db:NVDid:CVE-2009-1535

Trust: 3.6

db:USCERTid:TA09-160A

Trust: 2.6

db:CERT/CCid:VU#787932

Trust: 2.0

db:BIDid:34993

Trust: 1.1

db:SECUNIAid:35109

Trust: 0.9

db:MILW0RMid:8704

Trust: 0.8

db:USCERTid:SA09-160A

Trust: 0.8

db:VUPENid:ADV-2009-1330

Trust: 0.8

db:JVNDBid:JVNDB-2009-001542

Trust: 0.8

db:CNNVDid:CNNVD-200906-166

Trust: 0.6

db:EXPLOIT-DBid:8806

Trust: 0.1

db:VULMONid:CVE-2009-1535

Trust: 0.1

db:PACKETSTORMid:78216

Trust: 0.1

db:PACKETSTORMid:77606

Trust: 0.1

sources: CERT/CC: VU#787932 // VULMON: CVE-2009-1535 // BID: 34993 // JVNDB: JVNDB-2009-001542 // PACKETSTORM: 78216 // PACKETSTORM: 77606 // CNNVD: CNNVD-200906-166 // NVD: CVE-2009-1535

REFERENCES

url:http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html

Trust: 2.5

url:http://isc.sans.org/diary.html?n&storyid=6397

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta09-160a.html

Trust: 2.5

url:http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0135.html

Trust: 1.7

url:http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0139.html

Trust: 1.7

url:http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0144.html

Trust: 1.7

url:http://archives.neohapsis.com/archives/fulldisclosure/2009-05/att-0135/iis_advisory.pdf

Trust: 1.7

url:http://view.samurajdata.se/psview.php?id=023287d6&page=1

Trust: 1.7

url:http://www.attrition.org/pipermail/vim/2009-june/002192.html

Trust: 1.7

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6029

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/787932

Trust: 1.2

url:http://www.microsoft.com/technet/security/advisory/971492.mspx

Trust: 1.1

url:http://seclists.org/fulldisclosure/2009/may/0134.html

Trust: 0.8

url:http://milw0rm.com/exploits/8704

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1535

Trust: 0.8

url:http://www.jpcert.or.jp/at/2009/at090011.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnvu787932/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnta09-160a/index.html

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2009-14/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1535

Trust: 0.8

url:http://secunia.com/advisories/35109

Trust: 0.8

url:http://www.securityfocus.com/bid/34993

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa09-160a.html

Trust: 0.8

url:http://www.vupen.com/english/advisories/2009/1330

Trust: 0.8

url:http://www.cyberpolice.go.jp/#topics

Trust: 0.8

url:http://blogs.technet.com/srd/archive/2009/05/20/answers-to-the-iis-webdav-authentication-bypass-questions.aspx

Trust: 0.3

url:http://blog.zoller.lu/2009/05/iis-6-webdav-unicode-bug-that-wont-die.html

Trust: 0.3

url:http://milw0rm.com/sploits/2009-iis-advisory.pdf

Trust: 0.3

url:http://www.microsoft.com/windowsserver2003/iis/default.mspx

Trust: 0.3

url:http://blogs.technet.com/srd/archive/2009/05/18/more-information-about-the-iis-authentication-bypass.aspx

Trust: 0.3

url:http://technet.microsoft.com/en-us/security/cc242650.aspx

Trust: 0.3

url:http://www.skullsecurity.org/blog/?p=285

Trust: 0.3

url:/archive/1/503857

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2009-215.htm

Trust: 0.3

url:http://www.microsoft.com/technet/security/bulletin/ms09-020.mspx

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/http-webdav-bypass-auth-unicode

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=18261

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/8806/

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms09-jun.mspx>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta09-160a.html>

Trust: 0.1

url:http://technet.microsoft.com/en-us/wsus/default.aspx>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=ms09-jun>

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/35109/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/try_vi/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#787932 // VULMON: CVE-2009-1535 // BID: 34993 // JVNDB: JVNDB-2009-001542 // PACKETSTORM: 78216 // PACKETSTORM: 77606 // CNNVD: CNNVD-200906-166 // NVD: CVE-2009-1535

CREDITS

Kingcope※ kingcope@gmx.net

Trust: 0.6

sources: CNNVD: CNNVD-200906-166

SOURCES

db:CERT/CCid:VU#787932
db:VULMONid:CVE-2009-1535
db:BIDid:34993
db:JVNDBid:JVNDB-2009-001542
db:PACKETSTORMid:78216
db:PACKETSTORMid:77606
db:CNNVDid:CNNVD-200906-166
db:NVDid:CVE-2009-1535

LAST UPDATE DATE

2024-11-23T20:13:05.437000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#787932date:2009-05-20T00:00:00
db:VULMONid:CVE-2009-1535date:2020-11-23T00:00:00
db:BIDid:34993date:2009-06-18T16:49:00
db:JVNDBid:JVNDB-2009-001542date:2009-06-30T00:00:00
db:CNNVDid:CNNVD-200906-166date:2021-08-16T00:00:00
db:NVDid:CVE-2009-1535date:2024-11-21T01:02:42.803

SOURCES RELEASE DATE

db:CERT/CCid:VU#787932date:2009-05-19T00:00:00
db:VULMONid:CVE-2009-1535date:2009-06-10T00:00:00
db:BIDid:34993date:2009-05-15T00:00:00
db:JVNDBid:JVNDB-2009-001542date:2009-06-30T00:00:00
db:PACKETSTORMid:78216date:2009-06-10T20:55:09
db:PACKETSTORMid:77606date:2009-05-18T05:25:14
db:CNNVDid:CNNVD-200906-166date:2009-05-15T00:00:00
db:NVDid:CVE-2009-1535date:2009-06-10T14:30:00.170