Rapid7 Vulnerability & Exploit Database

MS Index Server %20 ASP Source Disclosure Vulnerability

Back to Search

MS Index Server %20 ASP Source Disclosure Vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
03/31/2000
Created
07/25/2018
Added
11/01/2004
Modified
07/31/2012

Description

Index Server can be used to cause IIS to display the source of .asp and possibly other server-side processed files.

By appending a space (%20) to the end of the filename specified in the 'CiWebHitsFile' variable, and setting 'CiHiliteType' to 'Full' and 'CiRestriction' to 'None', it is possible to retrieve the unprocessed source of the file.

This is possible on any machine with Index Server installed, even those with no normal .htw files, because the virtual file null.htw is stored in memory and the .htw extension is mapped by default to webhits.dll.

Solution(s)

  • install-microsoft-patch-6285b4af7d06a38a3d62197934b045b6
  • install-microsoft-patch-48fdec6e7bb0705bbf96175776cb1390

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;