This host is running the Microsoft IIS web server. This web server contains a configuration flaw that allows the retrieval of the global.asa file. This file may contain sensitive information such as database passwords, internal addresses, and web application configuration options
# OpenVAS Vulnerability Test
# $Id: DDI_GlobalASA_Retrieval.nasl 6063 2017-05-03 09:03:05Z teissa $
# Description: IIS Global.asa Retrieval
#
# Authors:
# H D Moore
#
# Copyright:
# Copyright (C) 2001 Digital Defense Inc.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
tag_summary = "This host is running the Microsoft IIS web server. This web server contains
a configuration flaw that allows the retrieval of the global.asa file.
This file may contain sensitive information such as database passwords,
internal addresses, and web application configuration options. This
vulnerability may be caused by a missing ISAPI map of the .asa extension
to asp.dll.";
tag_solution = "To restore the .asa map:
Open Internet Services Manager. Right-click on the affected web server and choose Properties
from the context menu. Select Master Properties, then Select WWW Service --> Edit --> Home
Directory --> Configuration. Click the Add button, specify C:\winnt\system32\inetsrv\asp.dll
as the executable (may be different depending on your installation), enter .asa as the extension,
limit the verbs to GET,HEAD,POST,TRACE, ensure the Script Engine box is checked and click OK.";
if(description)
{
script_id(10991);
script_version("$Revision: 6063 $");
script_tag(name:"last_modification", value:"$Date: 2017-05-03 11:03:05 +0200 (Wed, 03 May 2017) $");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_tag(name:"cvss_base", value:"7.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:N/A:N");
name = "IIS Global.asa Retrieval";
script_name(name);
summary = "Tries to retrieve the global.asa file";
script_category(ACT_ATTACK);
script_tag(name:"qod_type", value:"remote_vul");
script_copyright("This script is Copyright (C) 2001 Digital Defense Inc.");
family = "Web application abuses";
script_family(family);
script_dependencies("secpod_ms_iis_detect.nasl");
script_require_ports("Services/www", 80);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_require_keys("IIS/installed");
exit(0);
}
#
# The script code starts here
#
include("http_func.inc");
include("http_keepalive.inc");
port = get_http_port(default:80);
if(!get_port_state(port)){ exit(0); }
if( ! get_kb_item("IIS/" + port + "/Ver" ) ) exit( 0 );
function sendrequest (request, port)
{
return http_keepalive_send_recv(port:port, data:request);
}
req = http_get(item:"/global.asa", port:port);
reply = sendrequest(request:req, port:port);
if ("RUNAT" >< reply)
{
security_message(port:port);
set_kb_item(name:"iis/global.asa.download", value:TRUE);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo