header-logo
Suggest Exploit
vendor:
Internet Information Server (IIS)
by:
Unknown
4.6
CVSS
MEDIUM
Information Disclosure
200
CWE
Product Name: Internet Information Server (IIS)
Affected Version From: IIS 3.0
Affected Version To: IIS 4.0
Patch Exists: YES
Related CWE: CVE-2000-0523
CPE: a:microsoft:internet_information_server:3.0
Metasploit:
Other Scripts:
Platforms Tested: Windows
2000

Microsoft Internet Information Server (IIS) 3.0 Remote Administration Scripts Information Disclosure Vulnerability

An attacker can remotely access certain scripts in the /scripts/iisadmin directory of Microsoft Internet Information Server (IIS) 3.0, which can lead to the disclosure of sensitive information about the server's directory structure.

Mitigation:

Remove or secure the /scripts/iisadmin directory after upgrading from IIS 3.0 to IIS 4.0.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/2280/info

Microsoft Internet Information Server (IIS) 3.0 came with a series of remote administration scripts installed in /scripts/iisadmin off the web root directory. ism.dll is required for processing these scripts, and version 3.0 of IIS came with an ism.dll containing an authentication scheme to prevent unauthorized access. If an IIS 3.0 installation is upgraded to IIS 4.0 without removing these scripts, they can be accessed remotely without authentication due to changes in the authentication methods used by IIS 4.0. One of these scripts, bdir.htr, still functions under the IIS 4.0 server - and can be used by a remote attacker to obtain information about the server's directory structure. The script displays a directory listing of a directory specified as part of a request - but only directory names are displayed. Although privilege elevation cannot be accomplished directly by exploiting this script, the information about the server's directory structure thus obtained could potentially be used in mounting further attacks.

This can be exploited by requesting the following from the web server:

http://victim/scripts/iisadmin/bdir.htr??<path>

eg.,

http://www.victim-host.xxx/scripts/iisadmin/bdir.htr??d:\webs