ASP scripts create temporary files that aren't automatically removed
----------------------------------------------------------------------------
----


SUMMARY

Active server pages (ASP) with runtime errors expose a security hole that 
publishes the full source code name to the caller. If these scripts are 
published on the Internet before the programmer fully debugs them, major 
search engines might index them. These indexed ASP pages can be then 
located with a simple search. The search results publish the full path and 
file name for the ASP scripts, and this URL can be viewed in a browser and 
may reveal full source code with details of the business logic, database 
location and structure, and possibly even usernames and passwords that are 
present in the raw ASP page.

DETAILS

How to find those files via Search engines:
- In the AltaVista search engine execute a search for: +"Microsoft 
VBScript runtime error" +".inc, "

- Look for search results that include the full path and filename for an 
include (.inc) file.

- Append the include filename to the host name and call this up in a web 
browser.
Example:  www.example.com/stationery/browser.inc

Examples:

There are a huge number of examples on the web.

Resolution:

- Programmers should fully debug their ASP scripts before publishing them 
on the web
- Administrators need to secure the ASP include files so that external 
users will not be able to view them.


ADDITIONAL INFORMATION

The information was provided by:  <mailto:[EMAIL PROTECTED]> Jerry Walsh.



======================================== 

-------
AFLHI 058009990407128029/089802---(102598//991024)

- Kirim bunga untuk handaitaulan & relasi di jakarta www.indokado.com 
-- Situs sulap pertama di Indonesia http://www.impact.or.id/dmc-sulap/
To unsubscribe, e-mail : [EMAIL PROTECTED]
To subscribe, e-mail   : [EMAIL PROTECTED]
Netika BerInternet     : [EMAIL PROTECTED]

Kirim email ke