Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> ASP/ASA source using Microsoft Translate f: bug (IIS 5.1)


Vulnerability Assessment Details

ASP/ASA source using Microsoft Translate f: bug (IIS 5.1)

Vulnerability Assessment Summary
downloads the source of IIS scripts such as ASA,ASP

Detailed Explanation for this Vulnerability Assessment

There is a serious vulnerability in IIS 5.1 that permits a possible hacker to
view ASP/ASA source code instead of a processed file, when the files are
stored on a FAT partition.

ASP source code can contain sensitive information such as username's and
passwords for ODBC connections.

See also : http://ingehenriksen.blogspot.com/2005/09/iis-51-permits-for-remote-viewing-of.html
Solution : Install the remote web server on a NTFS partition
Network Security Threat Level: High

Networks Security ID: 14764

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Western Digital WD Caviar Blue SATA 250GB Desktop Hard Drive (WD2500AAKX)
$14.0
Western Digital WD Caviar Blue SATA 250GB Desktop Hard Drive (WD2500AAKX) pictureWestern Digital My Passport Ultra 1TB USB 3.0 Portable External Hard Drive Blue
$0.99
Western Digital My Passport Ultra 1TB USB 3.0 Portable External Hard Drive Blue pictureWD1600BEVT - 75ZCT2 WXH908407669 160GB 50014EE257734CF9 PCB Logic Board
$9.99
WD1600BEVT - 75ZCT2  WXH908407669 160GB 50014EE257734CF9 PCB Logic Board  pictureDell Inspiron 11 3179 Series Hard Drive Laptop Caddy w/Screws
$6.9
Dell Inspiron 11 3179 Series Hard Drive Laptop Caddy w/Screws picture


Discussions

No Discussions have been posted on this vulnerability.