header-logo
Suggest Exploit
vendor:
Site Server
by:
SecurityFocus
4.3
CVSS
MEDIUM
Information Disclosure
200
CWE
Product Name: Site Server
Affected Version From: Microsoft Site Server 3.0
Affected Version To: Microsoft Site Server 3.0
Patch Exists: NO
Related CWE: N/A
CPE: a:microsoft:site_server:3.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Microsoft Site Server Ad Server Sample Directory Vulnerability

A vulnerability in Microsoft Site Server's Ad Server Sample directory allows the retrieval of a site's configuration file (SITE.CSC) which contains sensitive information pertaining to an SQL database. The AdSamples directory is a part of the Ad Server component of Site Server which can be installed optionally. If the sample directory is installed and access controls are not applied, any user can read the site's SITE.CSC file. This file can may contain the DSN, username and password to access the Site Server's SQL database. The URL below contains the syntax to view the SITE.CSC file in a default installation: http://sitename/adsamples/config/site.csc A text editor may be used to view the contents of the SITE.CSC file. This file may contain the DSN, username, and password used to access the related SQL database.

Mitigation:

Ensure that access controls are applied to the AdSamples directory.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/256/info

A vulnerability in Microsoft Site Server's Ad Server Sample directory allows the retrieval of a site's configuration file (SITE.CSC) which contains sensitive information pertaining to an SQL database.

The AdSamples directory is a part of the Ad Server component of Site Server which can be installed optionally. If the sample directory is installed and access controls are not applied, any user can read the site's SITE.CSC file. This file can may contain the DSN, username and password to access the Site Server's SQL database. 

The URL below contains the syntax to view the SITE.CSC file in a default installation:

http://sitename/adsamples/config/site.csc

A text editor may be used to view the contents of the SITE.CSC file. This file may contain the DSN, username, and password used to access the related SQL database.