Vulnerabilities > CVE-2000-0126 - Unspecified vulnerability in Microsoft Internet Information Server 3.0/4.0

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
microsoft
nessus
exploit available

Summary

Sample Internet Data Query (IDQ) scripts in IIS 3 and 4 allow remote attackers to read files via a .. (dot dot) attack.

Vulnerable Configurations

Part Description Count
Application
Microsoft
2

Exploit-Db

descriptionMicrosoft IIS 3.0/4.0,Microsoft Index Server 2.0 Directory Traversal. CVE-2000-0126. Remote exploits for multiple platform
idEDB-ID:19742
last seen2016-02-02
modified2000-02-02
published2000-02-02
reporterMnemonix
sourcehttps://www.exploit-db.com/download/19742/
titleMicrosoft iis 3.0/4.0,Microsoft index server 2.0 - Directory Traversal

Nessus

NASL familyCGI abuses
NASL idIDQ_DLL.NASL
descriptionThere is a vulnerability in idq.dll which allows any remote user to read any file on the target system through the
last seen2020-06-01
modified2020-06-02
plugin id10115
published2000-02-08
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10115
titleMicrosoft IIS idq.dll Traversal Arbitrary File Access
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(10115);
 script_version ("1.37");

 script_cve_id("CVE-2000-0126");
 script_bugtraq_id(968);
 script_xref(name:"MSKB", value:"251170");
 script_xref(name:"MSKB", value:"252463");
 script_xref(name:"MSFT", value:"MS00-006");

 script_name(english:"Microsoft IIS idq.dll Traversal Arbitrary File Access");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote Windows host is affected by an information disclosure 
vulnerability." );
 script_set_attribute(attribute:"description", value:
"There is a vulnerability in idq.dll which allows any remote
user to read any file on the target system through the 'query.idq' 
parameter." );
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2000/ms00-006" );
 script_set_attribute(attribute:"solution", value:
"Microsoft's webhits.dll addresses some of this issue." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:U/RC:ND");

 script_set_attribute(attribute:"plugin_publication_date", value: "2000/02/08");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/02/02");
 script_cvs_date("Date: 2018/11/15 20:50:17");

 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();
 
 script_summary(english:"Attempts to read an arbitrary file");
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("find_service1.nasl", "http_version.nasl", "www_fingerprinting_hmap.nasl");
 script_require_ports("Services/www", 80);
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);


sig = get_kb_item("www/hmap/" + port + "/description");
if ( sig && "IIS" >!< sig ) exit(0);

base = "/query.idq?CiTemplate=../../../../../winnt/win.ini";

res1 = http_send_recv3(method:"GET", item:base, port:port);

if (isnull(res1)) exit(1, "The web server on port "+port+" failed to respond.");
if("[fonts]" >< res1[2])
{
  security_warning(port);
  exit(0);
}

res2 = http_send_recv3(method:"GET", item:string(base, crap(data:"%20", length:300)), port:port);
if (isnull(res2)) exit(1, "The web server on port "+port+" failed to respond.");
if("[fonts]" >< res[2])
{
  security_warning(port);
  exit(0);
}