YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

Beware the ‘Semicolon Bug’ in Microsoft’s IIS

Posted On 29 Dec 2009
By : admin

YNOT – A punctuation mark could mean disaster for the thousands of web and intranet servers running Microsoft’s Internet Information Services, a researcher warned on Christmas Day.Cyber-security expert Soroush Dalili said semicolons are far from benign in their interactions with IIS. A vagary in the way all versions of the software parse the “;” character could allow hackers to bypass malware filters and upload malicious code simply by appending a file extension containing the punctuation mark.

“Impact of this vulnerability is absolutely high, as an attacker can bypass file extension protections by using a semicolon after an executable extension such as ‘.asp,’ ‘.cer,’ ‘.asa’ and so on,” Dalili wrote in a report dated Dec. 25. “Many web applications are vulnerable against file uploading attacks because of this weakness of IIS.”

Dalili laid out a potential scenario in an email to Britain’s The Register.

“Assume a website which only accepts JPG files as the users’ avatars,” he wrote. “And the users can upload their avatars on the server. Now an attacker tries to upload ‘Avatar.asp;.jpg’ on the server. Web application considers this file as a JPG file. So, this file has the permission to be uploaded on the server. But when the attacker opens the uploaded file, IIS considers this file as an ASP file and tries to execute it by ‘asp.dll.’

“[T]he attacker can upload a web-shell on the server by using this method. Most of the uploaders only control the last part of the files as their extensions, and by using this method, their protection will be bypassed.”

A Microsoft spokeswoman told The Register Microsoft is not aware of any semicolon attacks, but the company is investigating the reported vulnerability.

Dalili recommended webmasters who want to work around the bug ensure none of their upload directories bear execute permissions. In addition, “web developers should ensure their applications never accept the user’s input as a file name,” The Register’s Dan Goodin advised.

  • google-share
Previous Story

Erotica Website David-Nudes.com Says Quality Matters with New Site Design for 20

Next Story

Midnight Videos Co-Founder Sal Sodano Dies

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • TrafficStars
    Marketing & Traffic Services
  • Mega Love Shop
    Online Retail Stores
  • Affiliate Wiz
    Software & Scripts
  • Premiere Listing

    Dao of Leads

    More Details

RECENT

POPULAR

COMMENTS

ChickPass Amateurs Drops Two "Try-A-Dick" Scenes with Karma Blay

Posted On 06 Jun 2025

Parker Savage Makes His See Him Fuck Debut

Posted On 06 Jun 2025

Erika Icon Scores June Cover of ASN Mag & Feature

Posted On 06 Jun 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Sex Toy Collective Dildo Sculptor

Posted On 19 Mar 2019

Find a good sex toy is now a problem,...

Posted On 18 Mar 2024

Thanks to the variety of sex toys, I can...

Posted On 02 Feb 2024

I understand the concerns about...

Posted On 05 Jan 2024

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy