Korean
<< Back
VID 22030
Severity 20
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The MS index server sample file, SQLQHit.asp is vulnerable which reveals file info and physical path. The SQLQHit.asp file shipped with Microsoft Index Server 2.0 and Option pack 4.0, is installed under the directory "/inetpub/iissamples/ISSamples/" by default. SQLQHit.asp file is used for SQL based Search, can be used by a malicious user to gather information about files in virtual folders under certain conditions.
By sending certain type of query to SQLQHit.asp page, malicious user can exploit this vulnerability. This vulnerability reveals the physical path, file attribute and some lines source code of files in virtual directory. Malicious user can't modify or write through this vulnerability. But the user can gather more information about the files in virtual directory. The vulnerability can be exploited only if index server runs.

* References:
http://www.securityfocus.com/bid/3339
http://www.iss.net/security_center/static/7125.php
Recommendation Never install sample files on production servers. If you have sample folders like iissamples/issamples/, remove sample files. Microsoft promises next version of Index service won't have this vulnerablity.
Related URL CVE-2001-0986 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)