ID

VAR-201009-0028


CVE

CVE-2010-2731


TITLE

Windows Run on Microsoft Internet Information Services Vulnerable to access restrictions

Trust: 0.8

sources: JVNDB: JVNDB-2010-002098

DESCRIPTION

Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.1 on Windows XP SP3, when directory-based Basic Authentication is enabled, allows remote attackers to bypass intended access restrictions and execute ASP files via a crafted request, aka "Directory Authentication Bypass Vulnerability.". An attacker can exploit this issue to gain unauthorized access to protected resources, which may lead to other attacks. This issue affects IIS 5.1; other 5.x versions may also be affected. Please note that this issue does not affect versions 6.x and 7.x. ---------------------------------------------------------------------- Passionate about writing secure code? http://secunia.com/company/jobs/open_positions/talented_programmer Read this if your favourite tool is a disassembler http://secunia.com/company/jobs/open_positions/reverse_engineer ---------------------------------------------------------------------- TITLE: Microsoft Internet Information Services Basic Authentication Security Bypass SECUNIA ADVISORY ID: SA40412 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40412/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40412 RELEASE DATE: 2010-07-02 DISCUSS ADVISORY: http://secunia.com/advisories/40412/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40412/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40412 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Soroush Dalili has discovered a vulnerability in Microsoft Internet Information Services, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error in the handling of basic authentication for directories. This can be exploited to bypass authentication and access e.g. protected directories by appending the NTFS stream name and stream type (":$i30:$INDEX_ALLOCATION") to the directory name within a request. The vulnerability is confirmed in version 5.1 on a fully-patched Windows XP SP3. SOLUTION: Do not rely on the basic authentication method to restrict access to resources. PROVIDED AND/OR DISCOVERED BY: Soroush Dalili ORIGINAL ADVISORY: http://soroush.secproject.com/blog/2010/07/iis5-1-directory-authentication-bypass-by-using-i30index_allocation/ OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA10-257A Microsoft Updates for Multiple Vulnerabilities Original release date: September 14, 2010 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Office Overview There are multiple vulnerabilities in Microsoft Windows and Microsoft Office. Microsoft has released updates to address these vulnerabilities. I. Description The Microsoft Security Bulletin Summary for September 2010 describes multiple vulnerabilities in Microsoft Windows and Microsoft Office. Microsoft has released updates to address the vulnerabilities. II. Impact A remote, unauthenticated attacker could execute arbitrary code or cause a vulnerable system or application to crash. III. Solution Apply updates Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for September 2010. That bulletin describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). IV. References * Microsoft Security Bulletin Summary for September 2010 - <http://www.microsoft.com/technet/security/bulletin/ms10-sep.mspx> * Microsoft Windows Server Update Services - <http://technet.microsoft.com/en-us/wsus/default.aspx> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA10-257A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA10-257A Feedback VU#447990" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2010 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History September 14, 2010: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBTI/u6T6pPKYJORa3AQKfgQgAsBDEHMH+Dq73qHFwsGnUIBWi7DkAV64s 0tz109GDGQRXL/MkXwWfaFfDc+h4ZUgjfVv93GBjK0NI78mYOWxSS7Pd3WhD6TaH YFcDcF4IW06Er4wEjgR+y5fTvF17k3Cix0GdsVzet/I2XMd4uCnIrHyLzLgZhf5s sWtv+kLaqCKUl8zsmcpmTcKUt+V2U3VWGeICIwuZXjB8FNHWuzYN1r/togFt0tcA 16gtGSCmdJy6Er+FyXxTJvWX4uJywBTDtIZZY/xyhGp2dBWUdOfY1k+7C5Dp/tCY Rq9tOY6caxHUYmitTtABaop83jTJFnS53lQJo4UizDNQoNbRSUIVFA== =dDpT -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2010-2731 // JVNDB: JVNDB-2010-002098 // BID: 41314 // VULMON: CVE-2010-2731 // PACKETSTORM: 91403 // PACKETSTORM: 93868

AFFECTED PRODUCTS

vendor:microsoftmodel:iisscope:eqversion:5.1

Trust: 1.7

vendor:microsoftmodel:windows xpscope:eqversion:sp3

Trust: 0.8

sources: BID: 41314 // JVNDB: JVNDB-2010-002098 // CNNVD: CNNVD-201009-134

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-2731
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-2731
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201009-134
value: MEDIUM

Trust: 0.6

VULMON: CVE-2010-2731
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-2731
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2010-2731 // JVNDB: JVNDB-2010-002098 // CNNVD: CNNVD-201009-134 // NVD: CVE-2010-2731

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.8

sources: JVNDB: JVNDB-2010-002098 // NVD: CVE-2010-2731

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201009-134

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201009-134

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-002098

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2010-2731

PATCH

title:MS10-065url:http://www.microsoft.com/technet/security/bulletin/MS10-065.mspx

Trust: 0.8

title:MS10-065url:http://www.microsoft.com/japan/technet/security/bulletin/ms10-065.mspx

Trust: 0.8

title:MS10-065eurl:http://www.microsoft.com/japan/security/bulletins/MS10-065e.mspx

Trust: 0.8

title:TA10-257Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-257a.html

Trust: 0.8

title:Security Update for Windows XP (KB2290570)url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=34198

Trust: 0.6

title:cvemapurl:https://github.com/t3l3machus/cvemap

Trust: 0.1

sources: VULMON: CVE-2010-2731 // JVNDB: JVNDB-2010-002098 // CNNVD: CNNVD-201009-134

EXTERNAL IDS

db:NVDid:CVE-2010-2731

Trust: 2.8

db:BIDid:41314

Trust: 1.2

db:USCERTid:TA10-257A

Trust: 0.9

db:SECUNIAid:40412

Trust: 0.9

db:VUPENid:ADV-2010-1681

Trust: 0.8

db:VUPENid:ADV-2010-2386

Trust: 0.8

db:USCERTid:SA10-257A

Trust: 0.8

db:JVNDBid:JVNDB-2010-002098

Trust: 0.8

db:CNNVDid:CNNVD-201009-134

Trust: 0.6

db:EXPLOIT-DBid:14179

Trust: 0.1

db:VULMONid:CVE-2010-2731

Trust: 0.1

db:PACKETSTORMid:91403

Trust: 0.1

db:PACKETSTORMid:93868

Trust: 0.1

sources: VULMON: CVE-2010-2731 // BID: 41314 // JVNDB: JVNDB-2010-002098 // PACKETSTORM: 91403 // PACKETSTORM: 93868 // CNNVD: CNNVD-201009-134 // NVD: CVE-2010-2731

REFERENCES

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-065

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6942

Trust: 1.7

url:http://www.securityfocus.com/bid/41314

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2731

Trust: 0.8

url:http://www.jpcert.or.jp/at/2010/at100023.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-257a/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2731

Trust: 0.8

url:http://secunia.com/advisories/40412

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-257a.html

Trust: 0.8

url:http://www.us-cert.gov/cas/techalerts/ta10-257a.html

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/2386

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/1681

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/#topics

Trust: 0.8

url:http://soroush.secproject.com/blog/2010/07/iis5-1-directory-authentication-bypass-by-using-i30index_allocation/

Trust: 0.4

url:http://soroush.secproject.com/downloadable/iis5.1_authentication_bypass.pdf

Trust: 0.3

url:http://www.microsoft.com/windowsserver2003/iis/default.mspx

Trust: 0.3

url:http://www.microsoft.com/technet/security/bulletin/ms10-065.mspx

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/14179/

Trust: 0.1

url:https://www.rapid7.com/db/modules/auxiliary/admin/http/iis_auth_bypass

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/company/jobs/open_positions/talented_programmer

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40412

Trust: 0.1

url:http://secunia.com/advisories/40412/#comments

Trust: 0.1

url:http://secunia.com/advisories/40412/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/company/jobs/open_positions/reverse_engineer

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta10-257a.html>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms10-sep.mspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://technet.microsoft.com/en-us/wsus/default.aspx>

Trust: 0.1

sources: VULMON: CVE-2010-2731 // BID: 41314 // JVNDB: JVNDB-2010-002098 // PACKETSTORM: 91403 // PACKETSTORM: 93868 // CNNVD: CNNVD-201009-134 // NVD: CVE-2010-2731

CREDITS

Luigi Auriemma

Trust: 0.6

sources: CNNVD: CNNVD-201009-134

SOURCES

db:VULMONid:CVE-2010-2731
db:BIDid:41314
db:JVNDBid:JVNDB-2010-002098
db:PACKETSTORMid:91403
db:PACKETSTORMid:93868
db:CNNVDid:CNNVD-201009-134
db:NVDid:CVE-2010-2731

LAST UPDATE DATE

2024-11-23T21:47:15.329000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2010-2731date:2020-11-23T00:00:00
db:BIDid:41314date:2010-09-14T18:51:00
db:JVNDBid:JVNDB-2010-002098date:2010-10-06T00:00:00
db:CNNVDid:CNNVD-201009-134date:2019-07-08T00:00:00
db:NVDid:CVE-2010-2731date:2024-11-21T01:17:16.503

SOURCES RELEASE DATE

db:VULMONid:CVE-2010-2731date:2010-09-15T00:00:00
db:BIDid:41314date:2010-07-01T00:00:00
db:JVNDBid:JVNDB-2010-002098date:2010-10-06T00:00:00
db:PACKETSTORMid:91403date:2010-07-02T14:32:56
db:PACKETSTORMid:93868date:2010-09-15T03:00:39
db:CNNVDid:CNNVD-201009-134date:2010-07-01T00:00:00
db:NVDid:CVE-2010-2731date:2010-09-15T19:00:19.260