Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2002.228 -- Macromedia Product Security Bulletin (MPSB02-01) Certain DOS Reserved Filenames May Cause ColdFusion to Display the Physical Web Root Directory when ColdFusion is Used with Microsoft IIS. 13 May 2002 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ColdFusion Server for Windows 4.x (All Editions) ColdFusion Server for Windows 5 (All Editions) Vendor: Macromedia Operating System: Windows Impact: Access Privileged Data Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- Macromedia Product Security Bulletin (MPSB02-01) Certain DOS reserved filenames may cause ColdFusion to display the physical web root directory when ColdFusion is used with Microsoft IIS. Originally Posted: May 9, 2002 Last Updated: May 9, 2002 Summary Certain DOS reserved filenames, such as NUL or PRN, can cause ColdFusion to display the path to the web root directory in an error message. For example: Error Diagnostic Information Cannot open CFML file The requested file "c:inetpubwwwrootNUL.cfm" cannot be found. When two or more periods are used in the filename, a different message is displayed: Error Diagnostic Information The template specification, 'c:InetPubwwwrootNUL..cfm', is illegal. Information about the web root location does not by itself grant unauthorized access. This information could potentially be useful in conjunction with some other vulnerability, especially if the web root has been changed from the default location: c:Inetpubwwwroot. Issue Two solutions are available to prevent IIS from passing DOS reserved filenames to ColdFusion for processing. Install and configure the Microsoft URLScan Security Tool Change IIS properties to check that files exist - -------------------------------------------------------------------------------- Method 1 - The Microsoft URLScan utility The URLScan IIS Security Tool and instructions is available at http://www.microsoft.com/technet/security/tools/URLscan.asp To configure URLScan to prohibit DOS reserved filenames, add the following entries to the urlscan.ini file located in C:WINNTsystem32inetsrvurlscan. [DenyUrlSequences] /NUL. ; Don't allow DOS reserved filenames as valid files /COM1. /COM2. /COM3. /LPT1. /LPT2. /PRN. /AUX. - -------------------------------------------------------------------------------- Method 2 - IIS Check that file exists In the IIS Properties dialog: choose: Master Properties for [WWW Service] select: [Edit] select: [Home Directory] tab select: [Configuration] button find: Application Mappings for: .cfm C:CFUSIONiniscf.dll ALL select: [Edit] enable: [Check that file exists] checkbox select: [OK] When prompted - apply this change to all virtual directories which can contain ColdFusion templates Repeat this procedure to change the Application Mappings for: .dbm C:CFUSIONiniscf.dll ALL This second method may have two disadvantages: The IIS error page will display for non-existent template, instead of the ColdFusion error page CFGRAPH cannot be used to create graphs as .jpg (JPEG) files - -------------------------------------------------------------------------------- Affected Software Versions ColdFusion Server for Windows 4.x , 5 (All Editions) What Macromedia is Doing Macromedia has notified customers of the security issues through standard communication channels. What Customers Should Do Customers are advised to implement one of the two methods described if disclosure of the IIS web root is a security concern. Revisions May 9, 2002 -- Bulletin first created. Reporting Security Issues Credit Macromedia would like to thank KPMG in Frederiksberg, Denmark for bringing this to our attention. Reporting Security Issues Macromedia is committed to addressing security issues and providing customers with the information on how they can protect themselves. If you identify what you believe may be a security issue with a Macromedia product, please send an email to secure@macromedia.com. We will work to appropriately address and communicate the issue. Receiving Security Bulletins When Macromedia becomes aware of a security issue that we believe significantly affects our products or customers, we will notify customers when appropriate. Typically this notification will be in the form of a security bulletin explaining the issue and the response. Macromedia customers who would like to receive notification of new security bulletins when they are released can sign up for our security notification service. For additional information on security issues at Macromedia, please visit: http://www.macromedia.com/security. ANY INFORMATION, PATCHES, DOWNLOADS, WORKAROUNDS OR FIXES PROVIDED BY MACROMEDIA IN THIS BULLETIN ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MACROMEDIA AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, WHETHER EXPRESS OR IMPLIED OR OTHERWISE, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ALSO, THERE IS NO WARRANTY OF NON-INFRINGEMENT, TITLE OR QUIET ENJOYMENT. (USA ONLY) SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. IN NO EVENT SHALL MACROMEDIA, INC. OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING, WITHOUT LIMITATION, DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL, PUNITIVE, COVER, LOSS OF PROFITS, BUSINESS INTERRUPTION OR THE LIKE, OR LOSS OF BUSINESS DAMAGES, BASED ON ANY THEORY OF LIABILITY INCLUDING BREACH OF CONTRACT, BREACH OF WARRANTY, TORT(INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR OTHERWISE, EVEN IF MACROMEDIA, INC. OR ITS SUPPLIERS OR THEIR REPRESENTATIVES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. (USA ONLY) SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, SO THE ABOVE EXCLUSION OR LIMITATION MAY NOT APPLY TO YOU AND YOU MAY ALSO HAVE OTHER LEGAL RIGHTS THAT VARY FROM STATE TO STATE. Macromedia reserves the right, from time to time, to update the information in this document with current information. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBPN/ifSh9+71yA2DNAQEHGgP7BgM5BEAz3YXQonDmg4etCDJ5yG19rnz0 yRYvf2Gbsfr29doBubabu3gBHiAvrt5ZETRP4+ZzR3H8B4dat8pdpuHKGiLgAmS6 Qo3NSsOkxTjVeKVUAu3B5NJO9q0WcmOSj0Vz2NxNuAB+KPBlBW3wrsmUA5R0VdrZ lFVcpAPnPvc= =oQPN -----END PGP SIGNATURE-----