📄 1073.txt
字号:
Rule: Sid:1073--Summary:This event is generated when an attempt is made to read web applicationsource code.--Impact:Information gathering.--Detailed Information:The webhits.exe sample program that comes with Microsoft Index Server in IIScontains a vulnerability that allows the reading of web application sourcecode.Sometimes web application source code contains highly sensitive information,such as database passwords and information concerning backend setups. Thiscould be a prelude to further attacks.--Affected Systems: Microsoft Index Server when deployed in conjunction with Microsoft IIS.--Attack Scenarios:Attacker sends a simple URL like the following and then chooses whichfile they want to view:http://servername/scripts/samples/search/webhits.exe--Ease of Attack:Simple. No exploit software required.--False Positives:None Known.--False Negatives:None Known--Corrective Action:Remove the samples directory from the webserver.Check the host for signs of compromise.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Alex Kirk <alex.kirk@sourcefire.com>--Additional References:http://www.win2000mag.com/Articles/Index.cfm?ArticleID=475&pg=2http://secinf.net/info/www/cgi-bugs.htm--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -