Lucene search

K
nessusThis script is Copyright (C) 2000-2024 Tenable Network Security, Inc.IIS_SAMPLES.NASL
HistoryApr 15, 2000 - 12:00 a.m.

Microsoft IIS Dangerous Sample Files Detection

2000-04-1500:00:00
This script is Copyright (C) 2000-2024 Tenable Network Security, Inc.
www.tenable.com
95

8 High

AI Score

Confidence

Low

Some of the IIS sample files are present.

They all contain various security flaws which could allow an attacker to execute arbitrary commands, read arbitrary files or gain valuable information about the remote system.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

# This script was written by Renaud Deraison <[email protected]>
# updated for Westpoint ltd. by Paul Johnston <[email protected]>
#
# Script audit and contributions from Carmichael Security 
#      Erik Anderson <[email protected]>
#      Added link to the Bugtraq message archive

# commented out 8/30/09, article not available. mail sent to SF 

# Reference : 
# http://online.securityfocus.com/infocus/1318

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(10370);
  script_version("1.43");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/28");

  script_name(english:"Microsoft IIS Dangerous Sample Files Detection");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server is hosting sample files.");
  script_set_attribute(attribute:"description", value:
"Some of the IIS sample files are present.

They all contain various security flaws which could allow 
an attacker to execute arbitrary commands, read arbitrary files 
or gain valuable information about the remote system.");
  script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/infocus/1318");
  script_set_attribute(attribute:"see_also", value:"http://technet.microsoft.com/en-us/library/cc750570.aspx");
  script_set_attribute(attribute:"solution", value:
"Delete the whole /iissamples directory");
  script_set_attribute(attribute:"risk_factor", value:"None");

  script_set_attribute(attribute:"plugin_publication_date", value:"2000/04/15");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:iis");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_set_attribute(attribute:"enable_cgi_scanning", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2000-2024 Tenable Network Security, Inc.");

  script_dependencies("find_service1.nasl", "http_version.nasl", "www_fingerprinting_hmap.nasl");
  script_require_keys("www/ASP");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

#--
# List of files and text strings to scan for
#--
files[0]    = "/iissamples/issamples/fastq.idq";
messages[0] = "The template file can not be found in the location specified";
 
files[1]    = "/iissamples/issamples/query.idq";
messages[1] = messages[0];
  
files[2]    = "/iissamples/exair/search/search.idq";
messages[2] = messages[0];
 
files[3]    = "/iissamples/exair/search/query.idq";
messages[3] = messages[0];
 
files[4]    = "/iissamples/issamples/oop/qsumrhit.htw?CiWebHitsFile=/iissamples/issamples/oop/qsumrhit.htw&CiRestriction=none&CiHiliteType=Full";
messages[4] = "This is the formatting page for webhits summary highlighting.";
    
files[5]    = "/iissamples/issamples/oop/qfullhit.htw?CiWebHitsFile=/iissamples/issamples/oop/qfullhit.htw&CiRestriction=none&CiHiliteType=Full";
messages[5] = "This is the formatting page for webhits full highlighting";

files[6]    = "/scripts/samples/search/author.idq";
messages[6] = messages[0];

files[7]    = "/scripts/samples/search/filesize.idq";
messages[7] = messages[0];
    
files[8]    = "/scripts/samples/search/filetime.idq";
messages[8] = messages[0];
 
files[9]    = "/scripts/samples/search/queryhit.idq";
messages[9] = messages[0];
 
files[10]    = "/scripts/samples/search/simple.idq";
messages[10] = messages[0];
 
files[11]    = "/iissamples/exair/howitworks/codebrws.asp";
messages[11] = "ASP Source code browser";
    
files[12]    = "/iissamples/issamples/query.asp";
messages[12] = "Sample ASP Search Form";

# these produce false positive against IIS

# files[0]    = "/scripts/samples/search/qfullhit.htw",
# messages[0] = "The format of QUERY_STRING is invalid.");
# files[0]    = "/scripts/samples/search/qsumrhit.htw",
# messages[0] = "The format of QUERY_STRING is invalid.");
        
#--
# Scan for all the files in the list
#--
found_files = "";


port = get_http_port(default:80);
if ( ! can_host_asp(port:port) ) exit(0);


for(i = 0; files[i]; i = i + 1)
{
  res = http_send_recv3(method:"GET", item:files[i], port:port);
  if (isnull(res)) exit(1, "The web server on port "+port+" failed to respond.");

  if (messages[i] >< res[2])
  {
    found_files = string(found_files, files[i], "\n");
  }
}

#--
# Report any holes found
#--
if(found_files != "")
{
  msg = string("\nThe following files are present :\n\n");
  report = string(msg, found_files);  
  security_note(port:port, extra:report);
}
VendorProductVersionCPE
microsoftiiscpe:/a:microsoft:iis

8 High

AI Score

Confidence

Low