Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Web Servers >> Check for IIS .cnf file leakage


Vulnerability Assessment Details

Check for IIS .cnf file leakage

Vulnerability Assessment Summary
Check for existence of world-readable .cnf files

Detailed Explanation for this Vulnerability Assessment

The IIS web server may permit remote users to read sensitive information
from .cnf files. This is not the default configuration.

Example, http://target/_vti_pvt%5csvcacl.cnf, access.cnf,
svcacl.cnf, writeto.cnf, service.cnf, botinfs.cnf,
bots.cnf, linkinfo.cnf and services.cnf

See also : http://www.safehack.com/Advisory/IIS5webdir.txt
Solution: If you do not need .cnf files, then delete them, otherwise use
suitable access control lists to ensure that the .cnf files are not
world-readable by Anonymous users.

Network Security Threat Level: Medium

Networks Security ID: 4078

Vulnerability Assessment Copyright: By John Lampe....j_lampe@bellsouth.net

Cables, Connectors

Hoover Vacuum Elite Rewind UH71009 Lower House Assembly
$12.85
Hoover Vacuum Elite Rewind UH71009 Lower House Assembly pictureStrong Laptop Cooling Vacuum Fan External USB Silent Ice Notebook Cooler Digital
$28.0
Strong Laptop Cooling Vacuum Fan External USB Silent Ice Notebook Cooler Digital picture#2 George A Philbrick Vtg Computer Vacuum Tube Op-Amp K2-W Sylvania 12AX7
$34.99
#2 George A Philbrick Vtg Computer Vacuum Tube Op-Amp K2-W Sylvania 12AX7 picture#1 George A Philbrick Vtg Computer Vacuum Tube Op-Amp K2-W Sylvania 12AX7
$34.99
#1 George A Philbrick Vtg Computer Vacuum Tube Op-Amp K2-W Sylvania 12AX7 picture


Discussions

No Discussions have been posted on this vulnerability.