Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
BID:1594
Info
Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
| Bugtraq ID: | 1594 |
| Class: | Origin Validation Error |
| CVE: |
CVE-2000-0746 |
| Remote: | Yes |
| Local: | Yes |
| Published: | Aug 21 2000 12:00AM |
| Updated: | Jul 11 2009 02:56AM |
| Credit: | Posted to Bugtraq on August 21, 2000 by Georgi Guninski <[email protected]>. |
| Vulnerable: |
Microsoft Windows NT Workstation 4.0 SP6a Microsoft Windows NT Workstation 4.0 SP6 Microsoft Windows NT Workstation 4.0 SP5 Microsoft Windows NT Workstation 4.0 SP4 Microsoft Windows NT Workstation 4.0 SP3 Microsoft Windows NT Workstation 4.0 SP2 Microsoft Windows NT Workstation 4.0 SP1 Microsoft Windows NT Workstation 4.0 Microsoft Windows NT Terminal Server 4.0 SP6 Microsoft Windows NT Terminal Server 4.0 SP5 Microsoft Windows NT Terminal Server 4.0 SP4 Microsoft Windows NT Terminal Server 4.0 SP3 Microsoft Windows NT Terminal Server 4.0 SP2 Microsoft Windows NT Terminal Server 4.0 SP1 Microsoft Windows NT Terminal Server 4.0 alpha Microsoft Windows NT Terminal Server 4.0 Microsoft Windows NT Server 4.0 SP6a Microsoft Windows NT Server 4.0 SP6 Microsoft Windows NT Server 4.0 SP5 Microsoft Windows NT Server 4.0 SP4 Microsoft Windows NT Server 4.0 SP3 Microsoft Windows NT Server 4.0 SP2 Microsoft Windows NT Server 4.0 SP1 Microsoft Windows NT Server 4.0 Microsoft Windows NT Enterprise Server 4.0 SP6a Microsoft Windows NT Enterprise Server 4.0 SP6 Microsoft Windows NT Enterprise Server 4.0 SP5 Microsoft Windows NT Enterprise Server 4.0 SP4 Microsoft Windows NT Enterprise Server 4.0 SP3 Microsoft Windows NT Enterprise Server 4.0 SP2 Microsoft Windows NT Enterprise Server 4.0 SP1 Microsoft Windows NT Enterprise Server 4.0 Microsoft Windows 2000 Terminal Services SP2 Microsoft Windows 2000 Terminal Services SP1 Microsoft Windows 2000 Terminal Services Microsoft Windows 2000 Server SP2 Microsoft Windows 2000 Server SP1 Microsoft Windows 2000 Server Microsoft Windows 2000 Professional SP2 Microsoft Windows 2000 Professional SP1 Microsoft Windows 2000 Professional Microsoft Windows 2000 Datacenter Server SP2 Microsoft Windows 2000 Datacenter Server SP1 Microsoft Windows 2000 Datacenter Server Microsoft Windows 2000 Advanced Server SP2 Microsoft Windows 2000 Advanced Server SP1 Microsoft Windows 2000 Advanced Server Microsoft IIS 5.0 Microsoft IIS 4.0 alpha Microsoft IIS 4.0 Microsoft FrontPage 2000 Server Extensions SR 1.2 |
| Not Vulnerable: |
Microsoft Windows 2000 Terminal Services SP3 Microsoft Windows 2000 Server SP3 Microsoft Windows 2000 Professional SP3 Microsoft Windows 2000 Datacenter Server SP3 Microsoft Windows 2000 Advanced Server SP3 |
Discussion
Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
If FrontPage Server Extensions 1.2 is installed on an IIS server, IIS may return content specified by a malicious third party back to a client through the use of specially formed links.
If additional text is appended to a request for shtml.dll, the server will generate an error including that text. If this text happens to be client-side scripting, it will be executed in the client's browser and treated as content originating from the server returning the error message (even though the scripting may have originated at another site entirely). This becomes an issue especially if the server specified in the hostile URL is a trusted site, as content from that site may then be granted a higher privilege level than usual.
For example, consider a link off of a page from a hostile website:
<a href="http://TrustedServer/_vti_bin/shtml.dll/<script>Hostile Code Here</script>">http://TrustedServer</a>.
If a user clicks on the link specified above, the script will get passed in the http request from the client to TrustedSite. TrustedSite will then return the script as part of the error message. The client, receiving the error page containing the script, will then execute it and assign to it all rights granted to content from TrustedSite.
Update (November 2, 2000): A new variant of this vulnerability has been discovered and is addressed in the re-release of patches described in Microsoft Security Bulletin (MS00-060). Please see 'Solution' for the patches.
If FrontPage Server Extensions 1.2 is installed on an IIS server, IIS may return content specified by a malicious third party back to a client through the use of specially formed links.
If additional text is appended to a request for shtml.dll, the server will generate an error including that text. If this text happens to be client-side scripting, it will be executed in the client's browser and treated as content originating from the server returning the error message (even though the scripting may have originated at another site entirely). This becomes an issue especially if the server specified in the hostile URL is a trusted site, as content from that site may then be granted a higher privilege level than usual.
For example, consider a link off of a page from a hostile website:
<a href="http://TrustedServer/_vti_bin/shtml.dll/<script>Hostile Code Here</script>">http://TrustedServer</a>.
If a user clicks on the link specified above, the script will get passed in the http request from the client to TrustedSite. TrustedSite will then return the script as part of the error message. The client, receiving the error page containing the script, will then execute it and assign to it all rights granted to content from TrustedSite.
Update (November 2, 2000): A new variant of this vulnerability has been discovered and is addressed in the re-release of patches described in Microsoft Security Bulletin (MS00-060). Please see 'Solution' for the patches.
Exploit / POC
Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
see discussion
see discussion
Solution / Fix
Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
Solution:
Microsoft has released patches which eliminate the vulnerability:
Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Advanced Server SP2
Microsoft Windows NT Workstation 4.0 SP6a
Microsoft Windows 2000 Terminal Services SP2
Microsoft Windows NT Server 4.0 SP6a
Microsoft Windows 2000 Professional SP2
Microsoft IIS 5.0
Microsoft IIS 4.0 alpha
Microsoft IIS 4.0
Microsoft Windows NT Terminal Server 4.0 alpha
Microsoft Windows NT Enterprise Server 4.0 SP6a
Solution:
Microsoft has released patches which eliminate the vulnerability:
Microsoft Windows 2000 Server SP2
-
Microsoft Q275657
http://download.microsoft.com/download/win2000platform/Patch/Q275657/N T5/EN-US/Q275657_W2K_SP2_x86_en.EXE
Microsoft Windows 2000 Advanced Server SP2
-
Microsoft Q275657
http://download.microsoft.com/download/win2000platform/Patch/Q275657/N T5/EN-US/Q275657_W2K_SP2_x86_en.EXE
Microsoft Windows NT Workstation 4.0 SP6a
-
Microsoft Q260347
http://download.microsoft.com/download/winntsp/Patch/Q275657/NT4/EN-US /crsscri.exe -
Microsoft Q260347
http://download.microsoft.com/download/winntsp/Patch/Q275657/NT4/EN-US /crsscris.exe
Microsoft Windows 2000 Terminal Services SP2
-
Microsoft Q275657
http://download.microsoft.com/download/win2000platform/Patch/Q275657/N T5/EN-US/Q275657_W2K_SP2_x86_en.EXE
Microsoft Windows NT Server 4.0 SP6a
-
Microsoft Q260347
http://download.microsoft.com/download/winntsp/Patch/Q275657/NT4/EN-US /crsscri.exe -
Microsoft Q260347
http://download.microsoft.com/download/winntsp/Patch/Q275657/NT4/EN-US /crsscris.exe
Microsoft Windows 2000 Professional SP2
-
Microsoft Q275657
http://download.microsoft.com/download/win2000platform/Patch/Q275657/N T5/EN-US/Q275657_W2K_SP2_x86_en.EXE
Microsoft IIS 5.0
-
Microsoft Q275657
http://download.microsoft.com/download/win2000platform/Patch/Q275657/N T5/EN-US/Q275657_W2K_SP2_x86_en.EXE
Microsoft IIS 4.0 alpha
-
Microsoft Q260347
Alpha
http://download.microsoft.com/download/winntsp/Patch/q260347/NT4ALPHA/ EN-US/crsscr4a.exe
Microsoft IIS 4.0
-
Microsoft Q260347
http://download.microsoft.com/download/winntsp/Patch/Q275657/NT4/EN-US /crsscri.exe -
Microsoft Q260347
http://download.microsoft.com/download/winntsp/Patch/Q275657/NT4/EN-US /crsscris.exe
Microsoft Windows NT Terminal Server 4.0 alpha
-
Microsoft Q260347
Alpha
http://download.microsoft.com/download/winntsp/Patch/q260347/NT4ALPHA/ EN-US/crsscr4a.exe
Microsoft Windows NT Enterprise Server 4.0 SP6a
References
Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
References:
References:
- Demonstration of cross site scripting. (Georgi Guninski)
- Frequently Asked Questions: Microsoft Security Bulletin (MS00-060) (Microsoft)