Exploit Microsoft IIS 4 (Windows NT) - Remote Web-Based Administration

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19147
Проверка EDB
  1. Пройдено
Автор
MNEMONIX
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-1999-1538
Дата публикации
1999-01-14
Код:
source: https://www.securityfocus.com/bid/189/info

Web-based administration for IIS 4.0 is, by default, limited to the local loopback address, 127.0.0.1. In instances where IIS4.0 was installed as an upgrade to IIS 2.0 or 3.0, a legacy ISAPI DLL (ISM.DLL) is left in the /scripts/iisadmin directory. An attacker may call this DLL via the following syntax:

http://www.server.com/scripts/iisadmin/ism.dll?http/dir

This URL prompts the user for a username/password to access the remote administration console. Although approved access does not permit the user to commit changes to the IIS server, it may allow them to gather sensitive information about the web server and its configuration.
 
Источник
www.exploit-db.com

Похожие темы