vendor:
IIS 6.0
by:
Isowarez
8,8
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: IIS 6.0
Affected Version From: IIS 6.0
Affected Version To: IIS 6.0
Patch Exists: NO
Related CWE: N/A
CPE: a:microsoft:iis:6.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows Server 2003 SP1
2020
Microsoft IIS 6.0 with PHP installed Authentication Bypass
By sending a special request to the IIS 6.0 Service running PHP the attacker can successfully bypass access restrictions. An attacker can access PHP files in the password protected directory and execute them without supplying proper credentials. Example request (path to the file): /admin::$INDEX_ALLOCATION/index.php IIS/6.0 will gracefully load the PHP file inside the 'admin' directory if the ::$INDEX_ALLOCATION postfix is appended to directory name. This can result in accessing administrative files and under special circumstances execute arbirary code remotely.
Mitigation:
Ensure that the IIS 6.0 Service is not running PHP and that the directory containing the PHP files is not accessible from the internet.