Skip to main content

LevelBlue Named Official Cybersecurity Advisor of the PGA of America. Learn more

LevelBlue Named Official Cybersecurity Advisor of the PGA of America. Learn more

Services
Cyber Advisory
Managed Cloud Security
Data Security
Managed Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
PGA of America Partnership
Secure What's Next
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Loading...
Loading...

PRB: Several sets of periods appear in the Top Pages table of my WebTrends report.

Expand / Collapse


This article applies to:

  • Firewall Suite 4.X

Symptoms:

  • Several sets of periods appear in the Top Pages table of my Firewall Suite report.

Causes:

Two periods together usually denote the ability to move "up" in a directory structure. This is illustrated in the following series of commands:

C:\Directory\Subdirectory> cd ..
C:\Directory>

However, this syntax is typically only used at an interactive prompt - it should never be seen in an HTTP request. Therefore, it can be confusing to see entries containing this syntax in the Top Pages report. Consider the following image from a Top Pages report:

The Top Pages listing shown above represents an attempt to gain remote privileges on an IIS server - in other words, a "hack" attempt.

In very early versions of IIS, it was possible to see documents above the wwwroot directory using the ../ syntax. For instance, a hacker could enter a URL such as:

http://www.victim.com/../../somefile.txt

...and his or her browser would display a file that was located in the C:\ directory on the remote web server. This behavior was characterized as a bug by Microsoft and was patched in a security update. This bug was only present on very early versions of IIS.

More recently, a newer version of the same bug has appeared, which is generally referred to as the IIS Unicode exploit. In this attack, hackers replace the central / character in /../../ with a set of unicode characters which are interpreted as a slash. This vulnerability was also patched by Microsoft, but much more recently.

Information:

If records are seen like this in the reports or in log files, it would be wise to make sure that the IIS server has been updated with all security fixes and service pack releases.

This article was previously published as:
NETIQKB2594

To contact LevelBlue about this article or to request support:


Rate this Article:
     
Tags:

Add Your Comments


Comment submission is disabled for anonymous users.
Please send feedback to Trustwave Technical Support or the Webmaster
.