SlideShare a Scribd company logo
1 of 2
Microsoft IIS 0Day Vulnerability in 
Parsing Files (semi‐colon bug) 
Last Update: 25 Dec. 2009 

Reason of Update: Update in version of vulnerable application 

Application: Microsoft Internet Information Services ‐ IIS (All versions Work successfully on IIS 6 and 
prior versions – IIS7 has not been tested yet – does not work on IIS7.5) 

Impact: Highly Critical for Web Applications 

Finding Date: April 2008 

Report Date: Dec. 2009 

Found by: Soroush Dalili (Irsdl {4t] yahoo [d0t} com) 

Website: Soroush.SecProject.com 

Weblog: Soroush.SecProject.com/blog/ 

Thanks From: Mr. Ali Abbas Nejad, Mormoroth, Aria‐Security Team, and other ethical hackers. 

Vulnerability/Risk Description: 

       IIS can execute any extension as an Active Server Page or any other executable extension. For 
        instance  “malicious.asp;.jpg”  is  executed  as  an  ASP  file  on  the  server.  Many  file  uploaders 
        protect  the  system  by  checking  only  the  last  section  of  the  filename  as  its  extension.  And  by 
        using  this  vulnerability,  an  attacker  can  bypass  this  protection  and  upload  a  dangerous 
        executable file on the server. 

Impact Description: 

       Impact of this vulnerability is absolutely high as an attacker can bypass file extension protections 
        by using a semi‐colon after an executable extension such as “.asp”, “.cer”, “.asa”, and so on. 
       Many web applications are vulnerable against file uploading attacks because of this weakness of 
        IIS.  In  a  measurement  which  was  performed  in  summer  2008  on  some  of  the  famous  web 
        applications, 70 percent of the secure file uploaders were bypassed by using this vulnerability. 

Method of Finding: 

       Simple fuzzer by using ASP language itself. 
More Details: 

       In  case  of  having  the  “malicious.asp;.jpg”,  web  applications  consider  it  as  a  JPEG  file  and  IIS 
        consider  it  as  an  ASP  file  and  pass  it  to  “asp.dll”.  This  bug  does  not  work  with  ASP.Net  as  the 
        .Net  technology  cannot  recognize  “malicious.aspx;.jpg”  as  a  .Net  file  and  shows  a  “page  not 
        found” error. 
       Besides using semi‐colon, “:” can be used to make an empty file  with any arbitrary extension. 
        For example by uploading “test.asp:.jpg”, an empty ASP file ‐ “test.asp” ‐ would be created on 
        the server on an NTFS partition. This is only because of “NTFS Alternate Data Streams” and it is 
        completely different from the semi‐colon vulnerability. 

Fast Solution/Recommendation: 

       For Web Developers: 
        o Highly Recommended: Use a completely random string as a filename and set its extension 
            by the web application itself (by using a “switch‐case or select‐case” for example) and never 
            accept the user’s input as the filename. 
        o Only accept alpha‐numerical strings as the filename and its extension. 
       For Webmasters: 
        o Remove “execute” permission from the upload directories (folders). 

Proof of Concept/Exploit: 

       Many of the web applications can be exploited by using this vulnerability. We cannot announce 
        their names before the Microsoft security patch for IIS because of security reasons. 

Related Documents: 

       http://www.owasp.org/index.php/Unrestricted_File_Upload 
       http://www.owasp.org/index.php/File_System  
       http://soroush.secproject.com/downloadable/iis‐semicolon‐report.pdf 

 

More Related Content

What's hot

ZENworks Application Virtualization for NGN Dummies
ZENworks Application Virtualization for NGN DummiesZENworks Application Virtualization for NGN Dummies
ZENworks Application Virtualization for NGN DummiesRoel van Bueren
 
Continuous Delivery concept overview. Continuous Integration Systems. DevOps ...
Continuous Delivery concept overview. Continuous Integration Systems. DevOps ...Continuous Delivery concept overview. Continuous Integration Systems. DevOps ...
Continuous Delivery concept overview. Continuous Integration Systems. DevOps ...eleksdev
 
Automated Web Testing With Selenium
Automated Web Testing With SeleniumAutomated Web Testing With Selenium
Automated Web Testing With SeleniumDeepak Mittal
 
Automated Testing Of EPiServer CMS Sites
Automated Testing Of EPiServer CMS SitesAutomated Testing Of EPiServer CMS Sites
Automated Testing Of EPiServer CMS Sitesjoelabrahamsson
 
Wordpress on Windows
Wordpress on WindowsWordpress on Windows
Wordpress on WindowsJosh Holmes
 
7 Effective Practices to Follow for Selenium Automation Testing
7 Effective Practices to Follow for Selenium Automation Testing7 Effective Practices to Follow for Selenium Automation Testing
7 Effective Practices to Follow for Selenium Automation TestingTestingXperts
 
Testing Ajax Web Applications
Testing Ajax Web ApplicationsTesting Ajax Web Applications
Testing Ajax Web ApplicationsTed Husted
 
Os Geisingerupdated
Os GeisingerupdatedOs Geisingerupdated
Os Geisingerupdatedoscon2007
 
First steps with selenium rc
First steps with selenium rcFirst steps with selenium rc
First steps with selenium rcDang Nguyen
 

What's hot (20)

Selenium
SeleniumSelenium
Selenium
 
ZENworks Application Virtualization for NGN Dummies
ZENworks Application Virtualization for NGN DummiesZENworks Application Virtualization for NGN Dummies
ZENworks Application Virtualization for NGN Dummies
 
Os Smarr
Os SmarrOs Smarr
Os Smarr
 
Continuous Delivery concept overview. Continuous Integration Systems. DevOps ...
Continuous Delivery concept overview. Continuous Integration Systems. DevOps ...Continuous Delivery concept overview. Continuous Integration Systems. DevOps ...
Continuous Delivery concept overview. Continuous Integration Systems. DevOps ...
 
Selenium Webdriver
Selenium WebdriverSelenium Webdriver
Selenium Webdriver
 
.net frameworks
.net frameworks.net frameworks
.net frameworks
 
Automated Web Testing With Selenium
Automated Web Testing With SeleniumAutomated Web Testing With Selenium
Automated Web Testing With Selenium
 
Selenium
SeleniumSelenium
Selenium
 
Os Mcmahan
Os McmahanOs Mcmahan
Os Mcmahan
 
EPiServer Deployment Tips & Tricks
EPiServer Deployment Tips & TricksEPiServer Deployment Tips & Tricks
EPiServer Deployment Tips & Tricks
 
Automated Testing Of EPiServer CMS Sites
Automated Testing Of EPiServer CMS SitesAutomated Testing Of EPiServer CMS Sites
Automated Testing Of EPiServer CMS Sites
 
Wordpress on Windows
Wordpress on WindowsWordpress on Windows
Wordpress on Windows
 
VirusScan Enterprise v8.8
VirusScan Enterprise v8.8VirusScan Enterprise v8.8
VirusScan Enterprise v8.8
 
Selenium
SeleniumSelenium
Selenium
 
7 Effective Practices to Follow for Selenium Automation Testing
7 Effective Practices to Follow for Selenium Automation Testing7 Effective Practices to Follow for Selenium Automation Testing
7 Effective Practices to Follow for Selenium Automation Testing
 
jDriver Presentation
jDriver PresentationjDriver Presentation
jDriver Presentation
 
Testing Ajax Web Applications
Testing Ajax Web ApplicationsTesting Ajax Web Applications
Testing Ajax Web Applications
 
Os Geisingerupdated
Os GeisingerupdatedOs Geisingerupdated
Os Geisingerupdated
 
First steps with selenium rc
First steps with selenium rcFirst steps with selenium rc
First steps with selenium rc
 
Introduction to Selenium Web Driver
Introduction to Selenium Web DriverIntroduction to Selenium Web Driver
Introduction to Selenium Web Driver
 

Viewers also liked

Mobile Network Operator Synchronization Survey Results
Mobile Network Operator Synchronization Survey ResultsMobile Network Operator Synchronization Survey Results
Mobile Network Operator Synchronization Survey ResultsADVA
 
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...Luca Bongiorni
 
Hacking Gsm - Secret Keys Revealed
Hacking Gsm - Secret Keys RevealedHacking Gsm - Secret Keys Revealed
Hacking Gsm - Secret Keys Revealedshlominar
 
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the YearJeremiah Grossman
 
MVNO Consulting Services
MVNO Consulting ServicesMVNO Consulting Services
MVNO Consulting ServicesYOZZO
 

Viewers also liked (6)

12 tcp-dns
12 tcp-dns12 tcp-dns
12 tcp-dns
 
Mobile Network Operator Synchronization Survey Results
Mobile Network Operator Synchronization Survey ResultsMobile Network Operator Synchronization Survey Results
Mobile Network Operator Synchronization Survey Results
 
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
 
Hacking Gsm - Secret Keys Revealed
Hacking Gsm - Secret Keys RevealedHacking Gsm - Secret Keys Revealed
Hacking Gsm - Secret Keys Revealed
 
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
 
MVNO Consulting Services
MVNO Consulting ServicesMVNO Consulting Services
MVNO Consulting Services
 

Similar to IIS Critical Vulnerability 23/12/09

"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim HegazyHackIT Ukraine
 
Session9-File Upload Security
Session9-File Upload SecuritySession9-File Upload Security
Session9-File Upload Securityzakieh alizadeh
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guideSudhanshu Chauhan
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersLewis Ardern
 
Project and Community Services the Apache Way, Bertrand Delacretaz, Apache Fo...
Project and Community Services the Apache Way, Bertrand Delacretaz, Apache Fo...Project and Community Services the Apache Way, Bertrand Delacretaz, Apache Fo...
Project and Community Services the Apache Way, Bertrand Delacretaz, Apache Fo...OW2
 
Project and Community Services the Apache Way
Project and Community Services the Apache WayProject and Community Services the Apache Way
Project and Community Services the Apache WayBertrand Delacretaz
 
1 app 2 developers 3 servers
1 app 2 developers 3 servers1 app 2 developers 3 servers
1 app 2 developers 3 serversMark Myers
 
Web security programming_ii
Web security programming_iiWeb security programming_ii
Web security programming_iigoogli
 
Web Security Programming I I
Web  Security  Programming  I IWeb  Security  Programming  I I
Web Security Programming I IPavu Jas
 
Web security programming_ii
Web security programming_iiWeb security programming_ii
Web security programming_iigoogli
 
Layer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And HardeningLayer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And HardeningCA API Management
 
Webappcontrol for Information Technology
Webappcontrol for Information TechnologyWebappcontrol for Information Technology
Webappcontrol for Information Technologytiwariparivaar24
 
Best practices of web app security (samvel gevorgyan)
Best practices of web app security (samvel gevorgyan)Best practices of web app security (samvel gevorgyan)
Best practices of web app security (samvel gevorgyan)ClubHack
 

Similar to IIS Critical Vulnerability 23/12/09 (20)

"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
 
Session9-File Upload Security
Session9-File Upload SecuritySession9-File Upload Security
Session9-File Upload Security
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guide
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript Developers
 
Asp.Net Tutorials
Asp.Net TutorialsAsp.Net Tutorials
Asp.Net Tutorials
 
Opr089 xx
Opr089 xxOpr089 xx
Opr089 xx
 
Project and Community Services the Apache Way, Bertrand Delacretaz, Apache Fo...
Project and Community Services the Apache Way, Bertrand Delacretaz, Apache Fo...Project and Community Services the Apache Way, Bertrand Delacretaz, Apache Fo...
Project and Community Services the Apache Way, Bertrand Delacretaz, Apache Fo...
 
Project and Community Services the Apache Way
Project and Community Services the Apache WayProject and Community Services the Apache Way
Project and Community Services the Apache Way
 
A comprehensive software infrastructure of .Net
A comprehensive software infrastructure of .Net  A comprehensive software infrastructure of .Net
A comprehensive software infrastructure of .Net
 
Php Presentation
Php PresentationPhp Presentation
Php Presentation
 
1 app 2 developers 3 servers
1 app 2 developers 3 servers1 app 2 developers 3 servers
1 app 2 developers 3 servers
 
demo1
demo1demo1
demo1
 
Web security programming_ii
Web security programming_iiWeb security programming_ii
Web security programming_ii
 
Web Security Programming I I
Web  Security  Programming  I IWeb  Security  Programming  I I
Web Security Programming I I
 
Web security programming_ii
Web security programming_iiWeb security programming_ii
Web security programming_ii
 
Layer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And HardeningLayer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And Hardening
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
INLS461_day14a.ppt
INLS461_day14a.pptINLS461_day14a.ppt
INLS461_day14a.ppt
 
Webappcontrol for Information Technology
Webappcontrol for Information TechnologyWebappcontrol for Information Technology
Webappcontrol for Information Technology
 
Best practices of web app security (samvel gevorgyan)
Best practices of web app security (samvel gevorgyan)Best practices of web app security (samvel gevorgyan)
Best practices of web app security (samvel gevorgyan)
 

IIS Critical Vulnerability 23/12/09