vendor:
IIS
by:
SecurityFocus
7.5
CVSS
HIGH
Command Injection
78
CWE
Product Name: IIS
Affected Version From: IIS 4.0
Affected Version To: IIS 5.0
Patch Exists: YES
Related CWE: N/A
CPE: a:microsoft:iis
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2000
Microsoft IIS Executable File Request Vulnerability
When Microsoft IIS receives a valid request for an executable file, the filename is then passed onto the underlying operating system which executes the file. In the event that IIS receives a specially formed request for an executable file followed by operating system commands, IIS will proceed to process the entire string rather than rejecting it. Thus, a malicious user may perform system commands through cmd.exe under the context of the IUSR_machinename account which could possibly lead to privilege escalation, deletion, addition, and modification of files, or full compromise of the server.
Mitigation:
Apply the patch (Q277873) provided by Microsoft.