Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> SQLQHit Directory Structure Disclosure


Vulnerability Assessment Details

SQLQHit Directory Structure Disclosure

Vulnerability Assessment Summary
SQLQHit Directory Stracture Disclosure

Detailed Explanation for this Vulnerability Assessment

The Sample SQL Query CGI is present.
The sample permits anyone to structure a certain query that would retrieve
the content of directories present on the local server.

Solution: Use Microsoft's Secure IIS Guide (For IIS 4.0 or IIS 5.0 respectively) or
Microsoft's IIS Lockdown tool to remove IIS samples.

Network Security Threat Level: Medium

Additional information:
http://www.securiteam.com/tools/5QP0N1F55Q.html (IIS Lookdown)
http://www.securiteam.com/windowsntfocus/5HP05150AQ.html (Secure IIS 4.0)
http://www.securiteam.com/windowsntfocus/5RP0D1F4AU.html (Secure IIS 5.0)


Networks Security ID: 3339

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 SecuriTeam

Cables, Connectors

ATARI CXL4002 BASIC Computer Language Cartridge
$7.99
ATARI CXL4002 BASIC Computer Language Cartridge picture3 ATARI Items:Personal Computer Product & Software Catalogs, 520/1040ST brochure
$29.95
3 ATARI Items:Personal Computer Product & Software Catalogs, 520/1040ST brochure pictureOfficial ATARI C017945 Power Supply - Works with 400/800 1200XL,1050,XF551,PCF55
$24.99
Official ATARI C017945 Power Supply - Works with 400/800 1200XL,1050,XF551,PCF55 pictureAtari 850 interface for 8 bit peripherals - Tested Works
$74.99
Atari 850 interface for 8 bit peripherals - Tested Works picture


Discussions

No Discussions have been posted on this vulnerability.