home *** CD-ROM | disk | FTP | other *** search
- #
- # This script was written by John Lampe (j_lampe@bellsouth.net)
- #
- #
- # See the Nessus Scripts License for details
- #
- if(description)
- {
- script_id(10576);
- script_cve_id("CAN-1999-0737");
- script_version ("$Revision: 1.19 $");
-
- script_name(english:"Check for dangerous IIS default files");
- desc["english"] = "
- The file viewcode.asp is a default IIS files which can give a
- malicious user a lot of unnecessary information about your file
- system or source files. Specifically, viewcode.asp can allow a
- remote user to potentially read any file on a webserver hard drive.
-
- Example,
- http://target/pathto/viewcode.asp?source=../../../../../../autoexec.bat
-
- Solution : If you do not need these files, then delete them, otherwise
- use suitable access control lists to ensure that the files are not
- world-readable.
-
- Risk factor : High";
-
- script_description(english:desc["english"]);
- script_summary(english:"Check for existence of viewcode.asp");
- script_category(ACT_GATHER_INFO);
- script_family(english:"CGI abuses", francais:"Abus de CGI");
- script_copyright(english:"By John Lampe....j_lampe@bellsouth.net");
- script_dependencies("find_service.nes", "http_version.nasl", "www_fingerprinting_hmap.nasl");
- script_require_ports("Services/www", 80);
- exit(0);
- }
-
-
-
- #
- # The script code starts here
-
- include("http_func.inc");
- include("http_keepalive.inc");
-
- port = get_http_port(default:80);
- if ( ! can_host_asp(port:port) ) exit(0);
-
-
- fl[0] = "/Sites/Knowledge/Membership/Inspired/ViewCode.asp";
- fl[1] = "/Sites/Knowledge/Membership/Inspiredtutorial/Viewcode.asp";
- fl[2] = "/Sites/Samples/Knowledge/Membership/Inspired/ViewCode.asp";
- fl[3] = "/Sites/Samples/Knowledge/Membership/Inspiredtutorial/ViewCode.asp";
- fl[4] = "/Sites/Samples/Knowledge/Push/ViewCode.asp";
- fl[5] = "/Sites/Samples/Knowledge/Search/ViewCode.asp";
- fl[6] = "/SiteServer/Publishing/viewcode.asp";
-
-
- list = "";
-
- for(i=0;fl[i];i=i+1)
- {
- url = fl[i];
- if(is_cgi_installed_ka(item:url, port:port))
- {
- list = string(list, "\n", url);
- }
- }
-
- if(strlen(list))
- {
- mywarning = string("The following files were found on the remote\n",
- "web server : ", list,
- "\nThese files allow anyone to read arbitrary files on the remote host\n",
- "Example, http://your.url.com/pathto/viewcode.asp?source=../../../../autoexec.bat\n",
- "\n\nSolution : delete these files\n",
- "Risk factor : High");
- security_warning(port:port, data:mywarning);
- }
-
-
-