Vulnerabilities > CVE-1999-0450 - Unspecified vulnerability in Microsoft products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
microsoft
nessus
exploit available

Summary

In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).

Exploit-Db

descriptionMicrosoft IIS 5.0 IISAPI Extension Enumerate Root Web Server Directory Vulnerability. CVE-1999-0450. Remote exploit for windows platform
idEDB-ID:19152
last seen2016-02-02
modified1999-01-26
published1999-01-26
reporterMnemonix
sourcehttps://www.exploit-db.com/download/19152/
titleMicrosoft IIS 5.0 IISAPI Extension Enumerate Root Web Server Directory Vulnerability

Nessus

NASL familyWeb Servers
NASL idIIS_PERL_PROBLEM.NASL
descriptionIt was possible to obtain the physical location of a virtual web directory of this host by issuing a request for a non-existent file with an IISAPI-registered extension. An attacker may use this flaw to gain more information about the remote host, and hence make more focused attacks.
last seen2020-06-01
modified2020-06-02
plugin id10120
published1999-06-22
reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10120
titleMicrosoft IIS perl.exe HTTP Path Disclosure
code
#
# (C) Tenable Network Security, Inc.
#

# See:
# Date:  29 Dec 2001 18:53:39 -0000
# From: "antoan miroslavov" <[email protected]>
# To: [email protected]
# Subject: Active Perl path reveal
#


include("compat.inc");

if(description)
{
 script_id(10120);
 script_version ("1.39");

 script_cve_id("CVE-1999-0450");
 script_bugtraq_id(194);

 script_name(english:"Microsoft IIS perl.exe HTTP Path Disclosure");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by an information disclosure 
vulnerability." );
 script_set_attribute(attribute:"description", value:
"It was possible to obtain the physical location of a virtual web
directory of this host by issuing a request for a non-existent file
with an IISAPI-registered extension.

An attacker may use this flaw to gain more information about the remote
host, and hence make more focused attacks." );
 script_set_attribute(attribute:"solution", value:
"Configure the web server to check for the existence of a file before
it returns an error message." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "1999/06/22");
 script_set_attribute(attribute:"vuln_publication_date", value: "1999/01/22");
 script_cvs_date("Date: 2018/07/13 15:08:46");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:iis");
 script_end_attributes();
 
 summary["english"] = "Attempts to find the location of the remote web root";
 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 
 
 script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
 family["english"] = "Web Servers";
 script_family(english:family["english"]);
 script_dependencie("find_service1.nasl", "httpver.nasl", "http_version.nasl", "www_fingerprinting_hmap.nasl");
 script_require_ports("Services/www", 80);
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

banner = get_http_banner(port:port);
if ( "Microsoft-IIS" >!< banner ) exit(0);

res = http_send_recv3(method:"GET", item:"/scripts/no-such-file.pl", port:port);
if (isnull(res)) exit(1, "The web server on port "+port+" failed to respond.");

res[2] = tolower(res[2]);
if("perl script" >< res[2]) security_warning(port:port);