Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...IIS Security Vulnerability and DNNIIS Security Vulnerability and DNN
Previous
 
Next
New Post
12/30/2009 1:58 PM
 

A security vulnerability in IIS was found announced over the Christmas Holiday. If you are using IIS 6, and a file is uploaded with a semicolon in the file name, the uploader can upload a malious asp to the server. For example if the file name is foo.asp;.jpg the file upload module in DNN will allow it, and when the user calls the file, it is passed to the asp script engine.  Details can be found here: blogs.technet.com/msrc/archive/2009/1... and here blogs.iis.net/nazim/archive/2009/12/2...

A quick check on my dev box with a 4.8x version of DNN reveals that yes this can happen. I uploaed a HelloWorld.asp;.jpg file to the site via the file uploader, and called the URL directly and yes it ran the script thru the asp script engine.

A QUICK fix for this is to add the asp.net dll to the Wildcards applications map of the website. Which then prevents the script from running.

This raises a question for me, Do I have DNN configured correctly, or did I misunderstand the documentation?  If I didn't at least everyone has a quick fix they can do to to stop this vulnerability from being exploited.

 
New Post
12/30/2009 2:28 PM
 

AFAIK, this only applies, if anyone is granted to upload files to your web site. Do not grant write permission for any upload folder to untrusted users and you should be safe.


Cheers from Germany,
Sebastian Leupold

dnnWerk - The DotNetNuke Experts   German Spoken DotNetNuke User Group

Speed up your DNN Websites with TurboDNN
 
New Post
12/30/2009 3:03 PM
 
Rick Hein wrote:

This raises a question for me, Do I have DNN configured correctly, or did I misunderstand the documentation?

A bit of both.  First, only those authorized to upload files can do this.  And frankly, if they can upload files, they don't need to go to this effort to have a malicious script appear, they can just upload it.  And second, DNN is ASP.NET.  Why would you have ASP Classic enabled on the server when you aren't using it?

There are a ton of ways to secure against this, most of which are done in IIS 6 by default, so you need to actively enable this ability on a server to begin with.  It's kind of hard for me to classify anything as a security vulnerability when the admin has to enable it.  The real security vulnerability is the admin, who could just as easily set a blank administrator password to allow security vulnerabilities.

 
 
New Post
12/30/2009 4:31 PM
 
Jeff Cochran wrote:
Rick Hein wrote:

This raises a question for me, Do I have DNN configured correctly, or did I misunderstand the documentation?

A bit of both.  First, only those authorized to upload files can do this.  And frankly, if they can upload files, they don't need to go to this effort to have a malicious script appear, they can just upload it.  And second, DNN is ASP.NET.  Why would you have ASP Classic enabled on the server when you aren't using it?

There are a ton of ways to secure against this, most of which are done in IIS 6 by default, so you need to actively enable this ability on a server to begin with.  It's kind of hard for me to classify anything as a security vulnerability when the admin has to enable it.  The real security vulnerability is the admin, who could just as easily set a blank administrator password to allow security vulnerabilities.

 
I am the admin for an instance of DNN that hosts nearly 300 websites. Now granted not ALL of them are currently active, but a great many are. Almost all of those sites have admins who have the ability to create users for their own sites, and give them login rights, etc. I have no way to know who all those users are, nor do I have time. Not only that, there have been numerous instances of "Authorized" users doing things they shouldn't be (insider credit card theft anyone?) . Yes they are allowed to upload files, however we have NOT given them permission to upload files that are any type of script file.  .asp, .aspx, .js, etc, so explain to me how you think they are able to upload malicous scripts that can compromise the server? This is NOT a sarcastic question, even thought it may appear to be. I can't frankly see how anybody can upload a script to my server without using this exploit, maybe you have some insight that I'm not seeing.
 
The argument that "DNN is ASP.NET, why do you have ASP turned on" is pretty weak as well. Various businesses have different requirements, so to make a blanket statement like that isn't helpful to the discussion. What about those hosting companies that host multiple sites on shared servers? Are all the sites running .NET apps?
 
My point remains: This is a SIMPLE exploit. I'm sure more than a few people have webservers with DNN on them that are vulnerable.
 
New Post
12/30/2009 4:44 PM
 

Rick,

I am going to disagree with you a bit here.

1.) Hosting companies and site administrators have the ability on a website by website basis to enable and disable services for each site.  Part of proper IIS security baselines SHOULD BE to ensure that no services are running or supported that are not needed.  For example no .asp or .php if you are .NET only.  Yes, if a site is running a mix, etc that is something else to deal with.

2.) I will agree that this is an issue, but in all reality, not something that is 100% DNN's responsibility to manage.  How would DNN support this, other than to potentially prohibit uploading files that contain a ; character.  The reason I say this is if the file has two extensions, which to we "accept", which is there.

This is an overall security concern at the server level, in that the server, processes files in a way that is considered un-natural.  Should DNN or other web-applications correct against this if possilbe?  Sure, but this is not a DNN issue.

Secondly, no matter how much you protect your site, extension limiting alone, is NOT something that is 100% foolproof.  To your point of internal, malicious users with access that you have given them permissions, they can still do things...


-Mitchel Sellers
Microsoft MVP, ASPInsider, DNN MVP
CEO/Director of Development - IowaComputerGurus Inc.
LinkedIn Profile

Visit mitchelsellers.com for my mostly DNN Blog and support forum.

Visit IowaComputerGurus.com for free DNN Modules, DNN Performance Tips, DNN Consulting Quotes, and DNN Technical Support Services
 
Previous
 
Next
HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...IIS Security Vulnerability and DNNIIS Security Vulnerability and DNN


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out