漏洞信息详情
Microsoft SQLXML ISAPI跨站脚本执行漏洞(MS02-030)
- CNNVD编号:CNNVD-200207-008
- 危害等级: 高危
- CVE编号:
CVE-2002-0187
- 漏洞类型:
输入验证
- 发布时间:
2002-06-12
- 威胁类型:
远程
- 更新时间:
2006-09-01
- 厂 商:
microsoft - 漏洞来源:
Matt Moore※ matt@w… -
漏洞简介
SQLXML ISAPI可以使IIS服务器能够从SQL服务器接受或向其输出XML数据,从而以XML的格式返回查询请求。
SQLXML ISAPI实现上对用户输入缺乏完善的过滤,远程攻击者可能SQLXML对其他用户进行跨站脚本攻击。
SQLXML支持通过URL输入直接进行SQL查询,比如:
IIS-server/Northwind?sql=SELECT+contactname,+phone+FROM+Customers+FOR+XML
它将会以XML文档的形式返回查询结果。可以在请求URL中插入一个\”root\”参数,那么在返回的XML文档中会包含\”root\”值所指定的标记,程序未对\”root\”参数的值进行充分过滤,导致远程攻击者可以利用\”root\”参数值进行跨站脚本攻击。
漏洞公告
临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
* 禁止通过URL输入直接进行SQL查询。
厂商补丁:
Microsoft
———
Microsoft已经为此发布了一个安全公告(MS02-030)以及相应补丁:
MS02-030:Unchecked Buffer in SQLXML Could Lead to Code Execution (Q321911)
链接:http://www.microsoft.com/technet/security/bulletin/MS02-030.asp” target=”_blank”>
http://www.microsoft.com/technet/security/bulletin/MS02-030.asp
补丁下载:
* Microsoft SQLXML version shipping with SQL 2000 Gold:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=39547” target=”_blank”>
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=39547
* Microsoft SQLXML version 2:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=38480” target=”_blank”>
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=38480
* Microsoft SQLXML version 3:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=38481” target=”_blank”>
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=38481
参考网址
来源: MS
名称: MS02-030
链接:http://www.microsoft.com/technet/security/bulletin/ms02-030.asp
来源: VULNWATCH
名称: 20020613 [VulnWatch] wp-02-0007: Microsoft SQLXML ISAPI Overflow and Cross Site Scripting
链接:http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0100.html
来源: BUGTRAQ
名称: 20020613 wp-02-0007: Microsoft SQLXML ISAPI Overflow and Cross Site Scripting
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=102397345410856&w=2