Rapid7 Vulnerability & Exploit Database

Microsoft IIS ISAPI Extension Enumerate Root Web Server Directory Vulnerability

Back to Search

Microsoft IIS ISAPI Extension Enumerate Root Web Server Directory Vulnerability

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
01/26/1999
Created
07/25/2018
Added
11/01/2004
Modified
12/04/2013

Description

A GET request that specifies a nonexistent file with an IISAPI-registered extension (ie .pl, .idq) will cause the IIS server to return an error message that includes the full path of the root web server directory.

This can happen if the file is referenced as the target of the GET or passed in a variable to a script that looks for the file.

Example:

CGI Error
      The specified CGI application misbehaved by not returning a complete set of HTTP headers.
      The headers it did return are: Can't open perl script "C:\InetPub\scripts\bogus.pl": No such file or directory
      

Solution(s)

  • http-iis-0013-iis4
  • http-iis-0013-iis5
  • http-iis-0013-iis7

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;