Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » Microsoft SQLXML ISAPI Overflow and Cross Site Scripting

Microsoft SQLXML ISAPI Overflow and Cross Site Scripting

by Nikola Strahija on June 13th, 2002 SQLXML allows XML data to be transferred to and from SQL Server, returning database queries as XML. SQlXML has two vulnerabilities: a buffer overflow in the SQLXML ISAPI filter, and a cross site scripting vulnerability. More complete details on how SQLXML works can be found in Microsoft's advisory (see below).


Details:
========


Cross Site Scripting
--------------------
Part of the functionality of SQLXML is being able to run SQL queries via a
URL such as:


IIS-server/Northwind?sql=SELECT+contactname,+phone+FROM+Customers+FOR+XML


This will return an XML document containing the query results.


It is possible to specify an extra parameter in the query, 'root', which
returns the data as above, but with a 'root' tag of the xml document as
the user specified.


This feature can be used to perform cross site scripting attacks against
the web application running on the server:


IIS-server/Northwind?sql=SELECT+contactname,+phone+FROM+Customers+FOR+XML&ro

ot=alert(document.domain)


Best practice recommends against allowing ad hoc URL queries against a
database.


SQLXML ISAPI Filter Buffer Overflow
-----------------------------------
When making SQL queries using the 'sql=' functionality of SQLXML it is
possible to specify certain parameters which affect the returned XML
(e.g. xsl=). One of these parameters lets you set a content-type.


It's possible to crash IIS by requesting an overly long string in the
?contenttype= parameter. This could also allow arbitrary code to be run
on the server in the context of the SYSTEM account.


A normal request looks like (in this case, a direct sql= query):


IIS-server/demos?sql=select+*+from+Customers+as+Customer+FOR+XML+auto&root=r

oot&xsl=custtable.xsl&contenttype=text/html


By specifying >240 characters for the content-type parameter it is possible
to make inetinfo.exe crash.


E.g. (using a 'template' file rather than a direct query, in this case):


IIS-Server/Nwind/Template/catalog.xml?contenttype=text/AAAA...AAA


Patch Information:
------------------
Microsoft has released patches and an advisory for the identified issues.


These are available from:


http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/

bulletin/MS02-030.asp


This advisory is available online at:


http://www.westpoint.ltd.uk/advisories/wp-02-0007.txt








Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »