{"vuid":"VU#787932","idnumber":"787932","name":"Microsoft IIS WebDAV Remote Authentication Bypass","keywords":["Microsoft","IIS","WebDAV","Remote Authentication Bypass"],"overview":"A vulnerability exists in the way Microsoft Internet Information Server (IIS) handles unicode tokens that may allow authentication bypass.","clean_desc":"Web-based Distributed Authoring and Versioning (WebDAV) is a set of HTTP extensions that allow collaborative management and editing of  files collected on remote servers. The way that Microsoft IIS's implementation of WebDAV handles unicode tokens may allow authentication bypass. According to Nikolaos Rangos: The specific flaw exists within the WebDAV functionality of IIS 6.0. The Web Server fails to properly handle unicode tokens when parsing the URI and sending back data. According to Thierry Zoller: The bug discovered by Rangos seems to suffer from a similar logic mistake when requesting source (translate:f) that has been introduced in the Webdav component. It appears that unicode characters are removed after the security checks. Note that this issue affects IIS versions prior to 7.0","impact":"A remote attacker may be able to bypass the access restrictions and list, download, upload and modify protected files.","resolution":"We are currently unaware of a practical solution to this problem. Please consider the following workarounds:","workarounds":"Disable WebDAV\nDisabling WebDAV prevents this vulnerability from being exploited and reduces attack surface. WebDAV functionality is disabled by default in IIS version 6.0 on systems that have not had services that utilize WebDAV installed. Please note that disabling WebDAV may affect the functionality of other applications such as SharePoint. Filter external HTTP requests\nAdministrators who are unable to disable WebDAV may be able to mitigate some risk by configuring their IDS to refuse external HTTP requests containing \"Translate: f\" HTTP headers. Please see Microsoft Security Advisory 971492 for further mitigation information.","sysaffected":"","thanks":"This vulnerability was publicly disclosed by Nikolaos Rangos.","author":"This document was written by Chris Taschner.","public":["http://seclists.org/fulldisclosure/2009/May/0134.html","http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html","http://milw0rm.com/exploits/8704","http://www.microsoft.com/technet/security/advisory/971492.mspx"],"cveids":["CVE-2009-1535"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2009-05-15T20:49:29Z","publicdate":"2009-03-12T00:00:00Z","datefirstpublished":"2009-05-19T11:53:32Z","dateupdated":"2009-05-20T20:59:22Z","revision":18,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"Not Defined (ND)","cvss_reportconfidence":"Not Defined (ND)","cvss_collateraldamagepotential":"Not Defined (ND)","cvss_targetdistribution":"Not Defined (ND)","cvss_securityrequirementscr":"Not Defined (ND)","cvss_securityrequirementsir":"Not Defined (ND)","cvss_securityrequirementsar":"Not Defined (ND)","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)","metric":0.0,"vulnote":null}