Potential security vulnerability due to unvalidated variable in wizard and some sample sites

Article translations Article translations
Article ID: 252614 - View products that this article applies to.
This article was previously published under Q252614
This article has been archived. It is offered "as is" and will no longer be updated.
Expand all | Collapse all

SYMPTOMS

On some of the sample sites and on custom-built sites created by the Site Builder Wizard, a Request.Querystring variable is directly appended to a SQL statement. Because this variable is not validated, it is possible for additional text to be appended. If this were done, the SQL commands would be executed as part of the query and could be used to create, modify, delete, or read data in the database.

The sites and files effected by these affects are:
  • Volcano Coffee sample site, Product.asp
  • Custom-Site (created by Site Builder Wizard), Product.ast

CAUSE

This problem is caused by code similar to the following (taken from the Product.asp file in the Volcano Coffee sample site):
cmdTemp.CommandText = Replace(MSCSQueryMap.department.SQLCommand,":1", Request("dept_id"))
				
Because Request("dept_id") is used by default, it is possible to modify a URL string of
http://hostname/shop/product.asp?dept_id=10&sku=MC001
to produce
http://hostname/shop/product.asp?dept_id= <I><additional SQL statement></I>&sku=MC001
				
The additional SQL statement could be something like a unioned select or another batched SQL command.

RESOLUTION

To resolve this problem, obtain the latest service pack for Site Server 3.0. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
219292 How to Obtain the Latest Site Server 3.0 Service Pack
For your convenience, the individual patch is available for download from the Microsoft Download Center:
Collapse this imageExpand this image
Download
Download Q252614.zip now
For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file. The English version of this fix should have the following file attributes or later:
   Date      Time   Size   File name  
   -----------------------------------
   2.2.2000  1:48   9,634  Product.asp   
   1.2.2000  4:19  13,948  Product.ast
				

STATUS

Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article. This problem was first corrected in Site Server 3.0 Service Pack 4.

MORE INFORMATION

For more information on this vulnerability, see the following Microsoft Web site:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS00-010.asp

Properties

Article ID: 252614 - Last Review: October 20, 2013 - Revision: 2.2
APPLIES TO
  • Microsoft Site Server 3.0 Commerce Edition
Keywords: 
kbnosurvey kbarchive kbbug kbfix kbgraphxlinkcritical kbsiteserv300sp4fix KB252614

Give Feedback

 

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com