VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-090518-001     ( JVNVU#787932 )
IIS6.0 WebDav Remote Auth Bypass
http://isc.sans.org/diary.html?storyid=6397&rss

If you're in the security business long enough, this one will sound extremely familiar: Apparently, adding certain Unicode characters to an URL makes it possible to bypass authentication in Microsoft IIS6 with WebDav and access or even upload files in folders which are supposed to be password protected.




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2009-05-18
Source Information Category:
Other (news, forums, etc.)
Last Updated:
2009-05-18




Affected Product Tags
cpe:/a:microsoft:iis:6.0     (Microsoft IIS 6.0)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
X Low [?]

Medium [?]
High [?]

[Impact Level] [?]
Low [?]

Low-Medium [?]
X Medium-High [?]
High [?]

[Access Required] [?]
Physical [?]

Local [?]
Non-routed [?]
X Routed [?]

[Authentication] [?]
Privileged [?]

Standard [?]
Limited [?]
X None or Unnecessary [?]

[User Interaction Required] [?]
Complex [?]

Simple [?]
X None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
Official Patch [?]

Official Workaround [?]
Unofficial Patch [?]
X None [?]

[Incident Activity] [?]
None [?]

X Exploit or PoC [?]
Activity Observed [?]

Alternatives
JVN JVNVU#787932 Microsoft IIS 6.0 WebDAV における認証回避の脆弱性
Microsoft Internet Information Services (IIS) には認証回避の脆弱性が存在します。








References

Copyright © 2009 JPCERT/CC All Rights Reserved.