5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.958 High
EPSS
Percentile
99.4%
Microsoft Windows Index Server ships with an optional sample package. A component of this package, SQLQHit.asp, can disclose sensitive information when sent crafted requests.
The Microsoft Windows Index Server ships with optional sample files. While these files should never be installed on a production machine, it is possible to accidentally install them with Options Pack 4.0. SQLQHit.asp is a component of the sample package used to perform web-based SQL queries. An intruder can submit a specially crafted URL to an Internet Information Services (IIS) server running Index Server and find the physical path of files on the system.
An intruder can gain sensitive information about a server’s directory and file structure.
Microsoft has an IIS checklist on which they recommend “Disable or remove all sample applications” - <http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsolutions/security/tools/iischk.asp>
Ensure that the sample files are not installed on your IIS Server. They are located in the \inetpub\iissamples\ISSamples\ folder and are installed by default with Options Pack 4.0.
914859
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: September 07, 2001 Updated: September 26, 2001
Affected
<http://www.microsoft.com/technet/itsolutions/security/tools/iischk.asp?frame=true#IIS12>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23914859 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
<http://www.securityfocus.com/bid/3339>
Our thanks to Syed Mohamed A, who reported this vulnerability to Microsoft and the CERT Coordination Center.
This document was written by Jason Rafail.
CVE IDs: | CVE-2001-0986 |
---|---|
Severity Metric: | 1.13 Date Public: |