Microsoft IIS And PWS 8.3 Directory Name Vulnerability

32bit Windows operating systems support long filenames, but also offer a means of compatibility with the older 8.3 filenames required by previous versions of DOS and Windows. This leads to problems with programs that have their own internal file security mechanisms. In Microsoft's IIS and PWS, requesting the 8.3 version of a file or directory effectively bypasses the security attributes that are referenced to the full, long version of the filename, with permissions being based instead on those of the parent directory.

Successful exploitation of this vulnerability could lead not only to unauthorized directory listings, disclosure of arbitrary files, but also to the remote execution of 'protected' scripts.


 

Privacy Statement
Copyright 2010, SecurityFocus