Korean
<< Back
VID 22134
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The IIS webserver contains a configuration flaw that allows the exposure of the global.asa file. An attacker can retrieve the content of global.asa which often contains some sensitive information such as SQL server's username and password.
Global.asa is a file maintained on the IIS server for each Active Server Page (ASP) program. The IIS server automatically processes the Global.asa file when either the IIS program starts and stops, or when a Web client starts and stops browser sessions that access the program's Web pages.
Typically, the global.asa file contains scripts to perform tasks, such as initializing application variables, connecting to databases, and sending cookies, etc.
This vulnerability may be caused by a missing ISAPI map of the .asa extension to asp.dll.

* Platforms Affected:
Microsoft IIS 4.0/5.0

* References:
http://www.iss.net/security_center/static/9065.php
http://cgi.nessus.org/plugins/dump.php3?id=10991
Recommendation To restore the .asa map:

1. Open Internet Services Manager.
2. Right-click on the affected web server and choose Properties from the context menu.
3. Select Master Properties, then Select WWW Service --> Edit --> Home Directory --> Configuration. (or Select Home Directory Tab, then Select Configuration)
4. Click the Add button, specify C:\winnt\system32\inetsrv\asp.dll as the executable (may be different depending on your installation), enter .asa as the extension, limit the verbs to GET,HEAD,POST,TRACE, ensure the Script Engine box is checked and click OK.
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)