mailing list archives
Alert: IIS 4 / IS 2 IDQ Cerberus Information Security Advisory (CISADV000202)
From: mnemonix () GLOBALNET CO UK (Mnemonix)
Date: Wed, 2 Feb 2000 23:49:26 -0000
Cerberus Information Security Advisory (CISADV000202)
Released: 2nd February 2000
Affected Systems : Microsoft Windows NT 4 running Internet Information
Server 3 or 4
Issue: Attackers can access files outside of the web
Author: David Litchfield (mnemonix () globalnet co uk)
Any web site running Internet Information Server 3 or 4 and
using Internet Data Query files to provide search functionality on the site
may be exposed. IIS also comes with some sample IDQ scripts that are
vulnerable so any website with these sample files left on are at risk.
Using these IDQ scripts or even custom scripts it is possible to break
outside of the web virtual root and gain unathorized access to files,
such as log files and in certain cases the backup version
of the Security Accounts Manager (sam._)
It does require for the attacker to know the path to the file, for the file
to be on the same logical disk drive as the IDQ file and for ACL to allow
read access to the anonymous Internet account or the Everyone/guests group.
The extent of this security hole depends upon whether the recent "webhits"
has been installed. See
If the patch has been installed there is still a vulnerability - however,
have not installed this patch are most at risk. Microsoft are re-releasing
and the updated patch. Please note that Windows 2000 does not seem to be
this. Cerberus' vulnerability scanner, CIS, has now been updated to check
for this issue.
For those that already have a copy of the scanner you can download the
from http://www.cerberus-infosec.co.uk/webscan.dll - however those that do
not yet have
the scanner, if you would like a copy please go to
http://www.cerberus-infosec.co.uk/ and follow
the Cerberus Internet Scanner link on the frontpage.
If the "webhits" patch HAS NOT been installed
Any idq file that resolves remote user input for any part of the template
file is dangerous.
eg: CiTemplate = %TemplateName%
The ISAPI application that deals with IDQ queries is idq.dll and it will
follow double dots in paths to template files, meaning an attacker can
break out of the web root. If the idq file appends .htx to the CiTemplate
some may think this will limit attackers to viewing only .htx files. Not so.
Quoting from the Index Server documentation (/iishelp/ix/htm/ixidqhlp.htm),
"Index Server does not support physical paths longer than the Windows NT
shell limit (260 characters)." Due to this limit it is possible to append
lots of spaces onto the name of the file we want to read and thereby
pushing the .htx out of the buffer and we're served back the file.
IDQ files known to be at risk in one way or another:
There are may be more.
If the "webhits" patch HAS been installed
Machines that have had the patch installed will only be vulnerable if the
IDQ file does not specify a .htx extention
CiTemplate = %TemplateName%
CiTemplate = /somedir/otherdir/%TemplateName%
are vulnerable whereas
CiTemplate = /somedir/otherdir/%TemplateName%.htx
is not vulnerable.
Review your IDQ files to determine if you are at risk. If so edit them
and use hardcoded template files. eg
and then edit your search form to reflect this change.
Remove any sample files from the system - not just
idq files. Apply the updated patch.
About Cerberus Information Security, Ltd
Cerberus Information Security, Ltd, a UK company, are specialists in
penetration testing and other security auditing services. They are the
developers of CIS (Cerberus' Internet security scanner) available for free
from their website: http://www.cerberus-infosec.co.uk
To ensure that the Cerberus Security Team remains one of the strongest
security audit teams available globally they continually research operating
system and popular service software vulnerabilites leading to the discovery
of "world first" issues. This not only keeps the team sharp but also helps
the industry and vendors as a whole ultimately protecting the end consumer.
As testimony to their ability and expertise one just has to look at exactly
how many major vulnerabilities have been discovered by the Cerberus Security
Team - over 40 to date, making them a clear leader of companies offering
such security services.
Founded in late 1999, by Mark and David Litchfield, Cerberus Information
Security, Ltd are located in London, UK but serves customers across the
World. For more information about Cerberus Information Security, Ltd please
visit their website or call on +44(0) 181 661 7405
Permission is hereby granted to copy or redistribute this advisory but only
in its entirety.
Copyright (C) 2000 by Cerberus Information Security, Ltd
- Alert: IIS 4 / IS 2 IDQ Cerberus Information Security Advisory (CISADV000202) Mnemonix (Feb 02)