ASP vulnerability with Alternate Data Streams

From: Aleph One (aleph1at_private)
Date: Wed Jul 01 1998 - 19:37:29 PDT

  • Next message: Aleph One: "Re: Alert: Microsoft Security Notification service"

    ---------- Forwarded message ----------
    Date: Tue, 30 Jun 1998 15:27:32 +0200
    From: Paul Ashton <paulat_private>
    To: NTBUGTRAQat_private
    Subject: ASP vulnerability with Alternate Data Streams
    
    Following on from the last .asp vulnerability which applied to
    URLs ending in spaces, and the previous that allowed .asps to
    be read if they end in ".", it turns out that there is yet
    another due to Alternate data streams.
    
    The unnamed data stream is normally accessed using the filename
    itself, with further named streams accessed as filename:stream.
    However, the unnamed data stream can also be accessed using
    filename::$DATA.
    
    If you open http://somewhere/something.asp::$DATA it turns out
    that you will be presented with the source of the ASP instead
    of the output. Deja vu?!
    
    It is left as an exercise for the reader to thing of further
    implications in other programs running on NT. Obviously,
    anything that to tries to restrict access based on filename
    instead of ACLs is going to have a hard time after this and
    the other recent revelations.
    
    Paul
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:01:31 PDT