Nessus Plugin #10575
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
Check for IIS .cnf file leakage
- Family:
- CGI abuses
- Category:
- infos
- Copyright:
- By John Lampe....j_lampe@bellsouth.net
- Summary:
- Check for existence of world-readable .cnf files
- Version:
- $Revision: 1.23 $
- Cve_id:
- -
- Bugtraq_id:
- 4078
- Xrefs:
- -
- Description:
The IIS web server may allow remote users to read sensitive information
from .cnf files. This is not the default configuration.
Example, http://target/_vti_pvt%5csvcacl.cnf, access.cnf,
svcacl.cnf, writeto.cnf, service.cnf, botinfs.cnf,
bots.cnf, linkinfo.cnf and services.cnf
See also : http://www.safehack.com/Advisory/IIS5webdir.txt
Solution: If you do not need .cnf files, then delete them, otherwise use
suitable access control lists to ensure that the .cnf files are not
world-readable by Anonymous users.
Risk factor : Medium
Generiert am 27.04.2005 um 18:49:54 Uhr.