Vulnerabilities > CVE-2001-0333 - Unspecified vulnerability in Microsoft Internet Information Server
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 15 |
Exploit-Db
description Microsoft IIS/PWS CGI Filename Double Decode Command Execution. CVE-2001-0333. Remote exploit for windows platform id EDB-ID:16467 last seen 2016-02-01 modified 2011-01-08 published 2011-01-08 reporter metasploit source https://www.exploit-db.com/download/16467/ title Microsoft IIS/PWS CGI Filename Double Decode Command Execution description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (6). CVE-2001-0333 . Remote exploit for windows platform id EDB-ID:20840 last seen 2016-02-02 modified 2001-05-15 published 2001-05-15 reporter A.Ramos source https://www.exploit-db.com/download/20840/ title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 6 description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (7). CVE-2001-0333 . Remote exploit for windows platform id EDB-ID:20841 last seen 2016-02-02 modified 2001-05-15 published 2001-05-15 reporter Gary O'Leary-Steele source https://www.exploit-db.com/download/20841/ title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 7 description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (8). CVE-2001-0333 . Remote exploit for windows platform id EDB-ID:20842 last seen 2016-02-02 modified 2001-05-15 published 2001-05-15 reporter Roelof source https://www.exploit-db.com/download/20842/ title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 8 description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (3). CVE-2001-0333 . Remote exploit for windows platform id EDB-ID:20837 last seen 2016-02-02 modified 2001-05-15 published 2001-05-15 reporter Cyrus The Gerat source https://www.exploit-db.com/download/20837/ title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 3 description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (4). CVE-2001-0333 . Remote exploit for windows platform id EDB-ID:20838 last seen 2016-02-02 modified 2001-05-15 published 2001-05-15 reporter MovAX source https://www.exploit-db.com/download/20838/ title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 4 description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (1). CVE-2001-0333 . Remote exploit for windows platform id EDB-ID:20835 last seen 2016-02-02 modified 2001-05-15 published 2001-05-15 reporter Filip Maertens source https://www.exploit-db.com/download/20835/ title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 1 description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (2). CVE-2001-0333 . Remote exploit for windows platform id EDB-ID:20836 last seen 2016-02-02 modified 2001-05-16 published 2001-05-16 reporter HuXfLuX source https://www.exploit-db.com/download/20836/ title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 2 description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (5). CVE-2001-0333 . Remote exploit for windows platform id EDB-ID:20839 last seen 2016-02-02 modified 2001-05-15 published 2001-05-15 reporter Leif Jakob source https://www.exploit-db.com/download/20839/ title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 5
Metasploit
description | This module will execute an arbitrary payload on a Microsoft IIS installation that is vulnerable to the CGI double-decode vulnerability of 2001. NOTE: This module will leave a metasploit payload in the IIS scripts directory. |
id | MSF:EXPLOIT/WINDOWS/IIS/MS01_026_DBLDECODE |
last seen | 2020-06-01 |
modified | 2020-05-19 |
published | 2010-07-12 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/iis/ms01_026_dbldecode.rb |
title | MS01-026 Microsoft IIS/PWS CGI Filename Double Decode Command Execution |
Nessus
NASL family | Web Servers |
NASL id | IIS_DECODE_BUG.NASL |
description | When IIS receives a user request to run a script, it renders the request in a decoded canonical form, and then performs security checks on the decoded request. A vulnerability results because a second, superfluous decoding pass is performed after the initial security checks are completed. Thus, a specially crafted request could allow an attacker to execute arbitrary commands on the IIS Server. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10671 |
published | 2001-05-15 |
reporter | This script is Copyright (C) 2001-2018 Matt Moore / H D Moore |
source | https://www.tenable.com/plugins/nessus/10671 |
title | MS01-026 / MS01-044: Microsoft IIS Remote Command Execution (uncredentialed check) |
code |
|
Oval
accepted 2007-08-02T14:47:14.863-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Robert L. Hollis organization ThreatGuard, Inc.
description Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice. family windows id oval:org.mitre.oval:def:1018 status accepted submitted 2004-05-12T12:00:00.000-04:00 title Windows NT IIS Directory Traversal Command Execution (Test 2) version 28 accepted 2004-06-30T12:00:00.000-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation description Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice. family windows id oval:org.mitre.oval:def:1051 status accepted submitted 2004-05-12T12:00:00.000-04:00 title Windows 2000 IIS Directory Traversal Command Execution (Test 2) version 64 accepted 2016-02-08T10:00:00.000-05:00 class vulnerability contributors name Tiffany Bergeron organization The MITRE Corporation description Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice. family windows id oval:org.mitre.oval:def:37 status accepted submitted 2003-10-10T12:00:00.000-04:00 title Windows NT IIS Directory Traversal Command Execution (Test 1) version 27 accepted 2011-05-16T04:03:27.809-04:00 class vulnerability contributors name Tiffany Bergeron organization The MITRE Corporation name Tiffany Bergeron organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice. family windows id oval:org.mitre.oval:def:78 status accepted submitted 2003-10-10T12:00:00.000-04:00 title Windows 2000 IIS Directory Traversal Command Execution (Test 1) version 33
Packetstorm
data source https://packetstormsecurity.com/files/download/89962/ms01_026_dbldecode.rb.txt id PACKETSTORM:89962 last seen 2016-12-05 published 2010-05-26 reporter jduck source https://packetstormsecurity.com/files/89962/Microsoft-IIS-PWS-CGI-Filename-Double-Decode-Command-Execution.html title Microsoft IIS/PWS CGI Filename Double Decode Command Execution data source https://packetstormsecurity.com/files/download/24846/sa2001_02.txt id PACKETSTORM:24846 last seen 2016-12-05 published 2001-05-17 reporter nsfocus.com source https://packetstormsecurity.com/files/24846/sa2001_02.txt.html title sa2001_02.txt
Saint
bid | 2708 |
description | IIS Double Decoding Directory Traversal |
id | web_server_iis_double |
osvdb | 556 |
title | iis_double_decode |
type | remote |
References
- http://marc.info/?l=bugtraq&m=98992056521300&w=2
- http://marc.info/?l=bugtraq&m=98992056521300&w=2
- http://www.cert.org/advisories/CA-2001-12.html
- http://www.cert.org/advisories/CA-2001-12.html
- http://www.securityfocus.com/bid/2708
- http://www.securityfocus.com/bid/2708
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-026
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-026
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6534
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6534
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1018
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1018
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1051
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1051
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A37
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A37
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A78
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A78