Vulnerability Name:

CVE-2009-4445 (CCN-55308)

Assigned:2009-12-23
Published:2009-12-23
Updated:2017-08-17
Summary:Microsoft Internet Information Services (IIS), when used in conjunction with unspecified third-party upload applications, allows remote attackers to create empty files with arbitrary extensions via a filename containing an initial extension followed by a : (colon) and a safe extension, as demonstrated by an upload of a .asp:.jpg file that results in creation of an empty .asp file, related to support for the NTFS Alternate Data Streams (ADS) filename syntax.
Note: it could be argued that this is a vulnerability in the third-party product, not IIS, because the third-party product should be applying its extension restrictions to the portion of the filename before the colon.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P)
4.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
2.1 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-20
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2009-4445

Source: CCN
Type: SECTRACK ID: 1023387
Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1023387

Source: CCN
Type: SecProject Web site
Microsoft IIS 0Day Vulnerability in Parsing Files (semi-colon bug)

Source: MISC
Type: Third Party Advisory
http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf

Source: CCN
Type: Microsoft IIS Web site
The Official Microsoft IIS Site

Source: CCN
Type: OSVDB ID: 61432
Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation

Source: XF
Type: UNKNOWN
ms-iis-colon-security-bypass(55308)

Source: XF
Type: UNKNOWN
ms-iis-colon-security-bypass(55308)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:internet_information_services:*:*:*:*:*:*:*:* (Version <= 6.0)

  • Configuration CCN 1:
  • cpe:/a:microsoft:internet_information_server:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_information_server:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_information_server:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_information_server:5.0:::far_east:*:*:*:*
  • OR cpe:/a:microsoft:internet_information_server:4.0:alpha:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_information_server:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:iis:5.06:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_information_server:6.0:beta:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft internet information services *
    microsoft iis 5.1
    microsoft iis 6.0
    microsoft iis 1.0
    microsoft iis 4.0
    microsoft iis 5.0
    microsoft iis 4.0 alpha
    microsoft iis 5.0
    microsoft iis 3.0
    microsoft iis 2.0
    microsoft iis 5.06
    microsoft iis 6.0 beta