Vulnerability Name:

CVE-2009-4444 (CCN-55031)

Assigned:2009-12-23
Published:2009-12-23
Updated:2020-11-23
Summary:Microsoft Internet Information Services (IIS) 5.x and 6.x uses only the portion of a filename before a ; (semicolon) character to determine the file extension, which allows remote attackers to bypass intended extension restrictions of third-party upload applications via a filename with a (1) .asp, (2) .cer, or (3) .asa first extension, followed by a semicolon and a safe extension, as demonstrated by the use of asp.dll to handle a .asp;.jpg file.
CVSS v3 Severity:4.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P)
4.4 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:P/I:P/A:P)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: The Microsoft Security Response Center (MSRC)
New Reports of a Vulnerability in IIS

Source: MISC
Type: Broken Link
http://blogs.technet.com/msrc/archive/2009/12/27/new-reports-of-a-vulnerability-in-iis.aspx

Source: MITRE
Type: CNA
CVE-2009-4444

Source: CCN
Type: SA37831
Microsoft IIS ASP Multiple Extensions Security Bypass

Source: SECUNIA
Type: Third Party Advisory
37831

Source: CCN
Type: SECTRACK ID: 1023387
Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1023387

Source: CCN
Type: SecProject Web site
Microsoft IIS 0Day Vulnerability in Parsing Files (semi-colon bug)

Source: MISC
Type: Third Party Advisory
http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf

Source: CCN
Type: Microsoft IIS Web site
The Official Microsoft IIS Site

Source: CCN
Type: OSVDB ID: 61294
Microsoft IIS ASP Crafted semicolon Extension Security Bypass

Source: BID
Type: Third Party Advisory, VDB Entry
37460

Source: CCN
Type: BID-37460
RETIRED: Microsoft IIS Malformed Local Filename Security Bypass Vulnerability

Source: VUPEN
Type: Third Party Advisory
ADV-2009-3634

Source: XF
Type: UNKNOWN
iis-filenames-security-bypass(55031)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_information_services:6.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:microsoft:internet_information_services:6.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_server_2003:r2:sp2:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft internet information services 5.0
    microsoft internet information services 6.0
    microsoft internet information server 6.0
    microsoft windows server 2003 r2 sp2