'; echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "www.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "www.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "www.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "www.hp-telecom.com") { echo ''; echo 'hp-telecom'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

HTTP Attack (Attack ID:300594)

Release Date:2009-09-27

Attack Name:Global.asa access

OS Type:Window

Application Type:IIS

Severity:Warning

BUG ID

CVE ID

 

Description

Microsoft Internet Information Services (IIS) v5.0 contains scripting engines to support various advanced files types such as .ASP and .HTR. The scripting engines permit the execution of server-side processing. IIS determines which scripting engine is appropriate depending on the file extension. If an attacker crafts a URL request ending in 'Translate: f' and followed by a slash '/', IIS fails to send the file to the appropriate scripting engine for processing. Instead, it returns the source code of a referenced file, such as global.asa, to the browser. The Nessus vulnerability scanner references the global.asa file in a GET request to determine whether a host is susceptible to this exploit.

Impact:
Intelligence gathering. This attack may permit disclosure of the source code of global.asa file that is not normally available for viewing.

Affected Systems:
Microsoft IIS v5.0

Additional References:
http://www.microsoft.com/technet/security/bulletin/MS00-058.asp
http://cgi.nessus.org/plugins/dump.php3?id=10491
http://cgi.nessus.org/plugins/dump.php3?id=10991

 

Solution

Apply the patch referenced in the Microsoft link.