[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-14112":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":42},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":39,"name":40,"published":41,"updated":27},14112,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},3,"OpenVAS",{"id":18,"codename":27,"description":27,"severity":27,"risk_description":28,"public_description":29,"public_recommendation":30,"recommendation":27,"references":31,"cvssv3":27,"epss_score":34,"epss_percentile":35,"cve":36,"in_cisa_catalog":38,"date":27,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"One of these sample files, showcode.asp (installed in /msadc/Samples/SELECTOR/), is designed to view the source code of the sample applications via a web browser. The showcode.asp file does inadequate security checking and allows anyone with a web browser to view the contents of any text file on the web server. This includes files that are outside of the document root of the web server. The showcode.asp file is installed by default at the URL: http://www.example.com/msadc/Samples/SELECTOR/showcode.asp It takes 1 argument in the URL, which is the file to view. The format of this argument is: source=/path/filename This is a fairly dangerous sample file since it can view the contents of any other files on the system. The author of the ASP file added a security check to only allow viewing of the sample files which were in the /msadc directory on the system. The problem is the security check does not test for the .. characters within the URL. The only checking done is if the URL contains the string /msadc/. This allows URLs to be created that view, not only files outside of the samples directory, but files anywhere on the entire file system that the web servers document root is on. The full description can be found at the referenced link.","Internet Information Server (IIS) 4.0 ships with a set of sample files to help web developers learn about Active Server Pages (ASP). One of this sample file is prone to a directory traversal vulnerability.","For production servers, sample files should never be installed, so delete the entire /msadc/samples directory. If you must have the showcode.asp capability on a development server, the showcode.asp file should be modified to test for URLs with .. in them and deny those requests.",[32,33],"http://www.l0pht.com/advisories.html","http://www.securityfocus.com/bid/167",0.76516,0.98933,[37],"CVE-1999-0736",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.10007","Microsoft IIS showcode.asp Default File Directory Traversal Vulnerability - Active Check","2018-01-02T00:00:00Z",["Island",43],{"key":44,"params":45,"result":47},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":46},"{\"text-color\":\"gray\"}",{"head":48},{}]