Short Name |
HTTP:XSS:HTW-XSS |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
HTTP |
Keywords |
IIS Indexing Services Cross-Site Scripting |
Release Date |
2003/05/08 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects cross-site scripting attempts against Microsoft Indexing Services for Windows 2000. Attackers can use a CiRestriction parameter in a .htw request to the CiWebHitsFile component to impersonate a legitimate Web page and gather sensitive information.
A cross-site scripting vulnerability has been reported in Microsoft Indexing Services for Windows 2000/NT4 and its handling of the .htw extension. If a user inadvertantly opened a hostile link through a browser or HTML compliant e-mail client, active content such as JavaScript may be executed. For example, the following link when processed by IIS will yield successful exploitation: http://target/null.htw?CiWebHitsFile=filename.htm&CiRestriction="<SCRIPT>Active Scripting</SCRIPT>" It is not necessary to specify a valid .htw file because the virtual file null.htw is stored in memory and the .htw extension is mapped by default to webhits.dll. Indexing Services is shipped with Windows 2000, however is not started by default. Those who are running a web server and have enabled Indexing Services are recommended to apply the patch.