Rapid7 Vulnerability & Exploit Database

Microsoft Index Server Webhits.dll ASP Source Disclosure Vulnerability

Back to Search

Microsoft Index Server Webhits.dll ASP Source Disclosure Vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
03/31/2000
Created
07/25/2018
Added
11/01/2004
Modified
07/31/2012

Description

Webhits.dll is part of the Microsoft Index Server package distributed with Windows NT 4.0 and 2000.

A problem with the package could allow remote users to gain access to source code of ASP docuements.

The problem occurs in the handling of the space string by the library. When a page is requested using the null.htw file, the request is handled by the Webhits.dll library. However, null.htw is not a real file, and is only maintained in memory. By appending a space to the end of the requested file (%20), the source code of the page will be returned to the requesting user, rather than the actual page. This makes it possible for a user with malicious intentions to gain access to the system by extracting the user ID and passwords that may be contained in .asp and .asa files.

Solution(s)

  • http-iis-0026

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;