{"id":7175,"date":"2017-03-30T08:30:03","date_gmt":"2017-03-30T16:30:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/30\/news-966\/"},"modified":"2017-03-30T08:30:03","modified_gmt":"2017-03-30T16:30:03","slug":"news-966","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/30\/news-966\/","title":{"rendered":"Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt3.staticworld.net\/images\/idgnsImport\/2015\/08\/id-2956907-matrix-434036-100606417-medium.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lucian Constantin| Date: Thu, 30 Mar 2017 08:11:00 -0700<\/strong><\/p>\n<p>A proof-of-concept exploit has been published for an unpatched vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that&#8217;s no longer supported but still widely used.<\/p>\n<p>The exploit allows attackers to execute malicious code on Windows servers running IIS 6.0 with the privileges of the user running the application. Extended support for this version of IIS ended in July 2015 along with support for its parent product, Windows Server 2003.<\/p>\n<p>Even so, independent web server surveys suggest that IIS 6.0 still powers millions of public websites.\u00a0In addition, many companies might still run web applications on Windows Server 2003 and IIS 6.0 inside their corporate networks, so this vulnerability could help attackers perform lateral movement if they access such networks through other means.<\/p>\n<p>There&#8217;s evidence that this IIS vulnerability has been known by a limited number of attackers since at least July or August of last year. However, the publishing earlier this week of an exploit for it on GitHub makes it accessible to a larger number of hackers.<\/p>\n<p>&#8220;Other threat actors are now in the stages of creating malicious code based on the original proof-of-concept (PoC) code,&#8221; researchers from Trend Micro said in <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/iis-6-0-vulnerability-leads-code-execution\/\" target=\"_blank\">a blog post<\/a> Wednesday.<\/p>\n<p>According to the exploit&#8217;s authors, the vulnerability is a buffer overflow in the ScStoragePathFromUrl function of the IIS 6.0 WebDAV service. It can be exploited through a specially crafted PROPFIND request.<\/p>\n<p>Web Distributed Authoring and Versioning (WebDAV) is an extension of the standard Hypertext Transfer Protocol (HTTP) that allows users to create, change and move documents on a server. The extension supports several request methods, including PROPFIND, which is used to retrieve the properties of a resource.<\/p>\n<p>Since Microsoft won&#8217;t patch this vulnerability, one possible mitigation is to disable the WebDAV service on IIS 6.0 installations. Security firm\u00a0ACROS Security has also <a href=\"https:\/\/0patch.blogspot.ro\/2017\/03\/0patching-immortal-cve-2017-7269.html\" target=\"_blank\">developed a free &#8220;micropatch&#8221; for this vulnerability<\/a> &#8212; an unofficial patch that can be applied without restarting the affected server or even the IIS process.<\/p>\n<p>However, the best course of action would be to migrate affected websites to a newer IIS and Windows Server version altogether, as there are probably other vulnerabilities out there that also affect this platform and won&#8217;t get patched.<\/p>\n<p><a href=\"https:\/\/news.netcraft.com\/archives\/2017\/03\/24\/march-2017-web-server-survey.html\" target=\"_blank\">A March survey<\/a> by web analytics firm Netcraft revealed that around 185 million websites are still hosted on over 300,000 web servers that run Windows Server 2003.<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3186667\/security\/millions-of-websites-affected-by-unpatched-flaw-in-microsoft-iis-6-web-server.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt3.staticworld.net\/images\/idgnsImport\/2015\/08\/id-2956907-matrix-434036-100606417-medium.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lucian Constantin| Date: Thu, 30 Mar 2017 08:11:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>A proof-of-concept exploit has been published for an unpatched vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that&#8217;s no longer supported but still widely used.<\/p>\n<p>The exploit allows attackers to execute malicious code on Windows servers running IIS 6.0 with the privileges of the user running the application. Extended support for this version of IIS ended in July 2015 along with support for its parent product, Windows Server 2003.<\/p>\n<aside id=\"fsb-2070\" class=\"fakesidebar\"><strong>[ Further reading:  <a href=\"http:\/\/www.computerworld.com\/article\/3147819\/security\/fighting-ransomware-a-fresh-look-at-windows-server-approaches.html#tk.ctw-infsb\" target=\"_blank\">Fighting ransomware: A fresh look at Windows Server approaches<\/a> ]<\/strong><\/aside>\n<p>Even so, independent web server surveys suggest that IIS 6.0 still powers millions of public websites.\u00a0In addition, many companies might still run web applications on Windows Server 2003 and IIS 6.0 inside their corporate networks, so this vulnerability could help attackers perform lateral movement if they access such networks through other means.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3186667\/security\/millions-of-websites-affected-by-unpatched-flaw-in-microsoft-iis-6-web-server.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,11186],"class_list":["post-7175","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-web-apps"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7175"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7175\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7175"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}