Microsoft SQLXML ISAPI跨站脚本执行漏洞(MS02-030)

漏洞信息详情

Microsoft SQLXML ISAPI跨站脚本执行漏洞(MS02-030)

漏洞简介

SQLXML ISAPI可以使IIS服务器能够从SQL服务器接受或向其输出XML数据,从而以XML的格式返回查询请求。
SQLXML ISAPI实现上对用户输入缺乏完善的过滤,远程攻击者可能SQLXML对其他用户进行跨站脚本攻击。
SQLXML支持通过URL输入直接进行SQL查询,比如:
IIS-server/Northwind?sql=SELECT+contactname,+phone+FROM+Customers+FOR+XML
它将会以XML文档的形式返回查询结果。可以在请求URL中插入一个\”root\”参数,那么在返回的XML文档中会包含\”root\”值所指定的标记,程序未对\”root\”参数的值进行充分过滤,导致远程攻击者可以利用\”root\”参数值进行跨站脚本攻击。

漏洞公告

临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:

* 禁止通过URL输入直接进行SQL查询。
厂商补丁:
Microsoft
———
Microsoft已经为此发布了一个安全公告(MS02-030)以及相应补丁:
MS02-030:Unchecked Buffer in SQLXML Could Lead to Code Execution (Q321911)
链接:http://www.microsoft.com/technet/security/bulletin/MS02-030.asp” target=”_blank”>
http://www.microsoft.com/technet/security/bulletin/MS02-030.asp
补丁下载:
* Microsoft SQLXML version shipping with SQL 2000 Gold:

http://www.microsoft.com/Downloads/Release.asp?ReleaseID=39547” target=”_blank”>
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=39547

* Microsoft SQLXML version 2:

http://www.microsoft.com/Downloads/Release.asp?ReleaseID=38480” target=”_blank”>
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=38480

* Microsoft SQLXML version 3:

http://www.microsoft.com/Downloads/Release.asp?ReleaseID=38481” target=”_blank”>
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=38481

参考网址

来源: MS
名称: MS02-030
链接:http://www.microsoft.com/technet/security/bulletin/ms02-030.asp

来源: VULNWATCH
名称: 20020613 [VulnWatch] wp-02-0007: Microsoft SQLXML ISAPI Overflow and Cross Site Scripting
链接:http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0100.html

来源: BUGTRAQ
名称: 20020613 wp-02-0007: Microsoft SQLXML ISAPI Overflow and Cross Site Scripting
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=102397345410856&w=2

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享