Vulnerability Description
Microsoft Internet Information Services (IIS), when used in conjunction with unspecified third-party upload applications, allows remote attackers to create empty files with arbitrary extensions via a filename containing an initial extension followed by a : (colon) and a safe extension, as demonstrated by an upload of a .asp:.jpg file that results in creation of an empty .asp file, related to support for the NTFS Alternate Data Streams (ADS) filename syntax. NOTE: it could be argued that this is a vulnerability in the third-party product, not IIS, because the third-party product should be applying its extension restrictions to the portion of the filename before the colon.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Internet Information Services | <= 6.0 |
Related Weaknesses (CWE)
References
- http://securitytracker.com/id?1023387Third Party AdvisoryVDB Entry
- http://soroush.secproject.com/downloadable/iis-semicolon-report.pdfThird Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55308
- http://securitytracker.com/id?1023387Third Party AdvisoryVDB Entry
- http://soroush.secproject.com/downloadable/iis-semicolon-report.pdfThird Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55308
FAQ
What is CVE-2009-4445?
CVE-2009-4445 is a vulnerability with a CVSS score of 6.0 (MEDIUM). Microsoft Internet Information Services (IIS), when used in conjunction with unspecified third-party upload applications, allows remote attackers to create empty files with arbitrary extensions via a ...
How severe is CVE-2009-4445?
CVE-2009-4445 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-4445?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Internet Information Services.