CVE-1999-0725 : Detail

CVE-1999-0725

A05-Security Misconfiguration
0.71%V3
Network
2000-01-04
04h00 +00:00
2024-08-01
16h48 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

When IIS is run with a default language of Chinese, Korean, or Japanese, it allows a remote attacker to view the source code of certain files, a.k.a. "Double Byte Code Page".

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-16 Category : Configuration
Weaknesses in this category are typically introduced during the configuration of the software.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.1 AV:N/AC:M/Au:N/C:C/I:N/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 19361

Publication date : 1999-06-23 22h00 +00:00
Author : Microsoft
EDB Verified : Yes

source: https://www.securityfocus.com/bid/477/info This vulnerability could allow a web site viewer to obtain the source code for .asp and similar files if the server's default language (Input Locale) is set to Chinese, Japanese or Korean. How this works is as follows: IIS checks the extension of the requested file to see if it needs to do any processing before delivering the information. If the requested extension is not on it's list, it then makes any language-based calculations, and delivers the file. If a single byte is appended to the end of the URL when IIS to set to use one of the double-byte language packs (Chinese, Japanese, or Korean) the language module will strip it as invalid, then look for the file. Since the new URL now points to a valid filename, and IIS has already determined that this transaction requires no processing, the file is simply delivered as is, exposing the source code. Request a URL of a known-good file that requires server processing, then append a hex value between x81 and xfe to the URL. For example: <http://myhost/main.asp%81>. If your server is vulnerable you will receive back the source code of your .asp file.

Products Mentioned

Configuraton 0

Microsoft>>Internet_information_server >> Version 3.0

Microsoft>>Internet_information_server >> Version 3.0

Microsoft>>Internet_information_server >> Version 3.0

Microsoft>>Internet_information_server >> Version 4.0

Microsoft>>Internet_information_server >> Version 4.0

Microsoft>>Internet_information_server >> Version 4.0

References

http://www.securityfocus.com/bid/477
Tags : vdb-entry, x_refsource_BID