This script is Copyright (C) 2000-2013 Tenable Network Security, Inc.
The remote web server is affected by a password policy bypass
Microsoft IIS installs the 'aexp2.htr', 'aexp2b.htr', 'aexp3.htr', or
'aexp4.htr' files in the '/iisadmpwd' directory by default. These
fiels can be used by an attacker to brute-force a valid
username/password. A valid user may also use it to change his password
on a locked account, bypassing password policy.
See also :
Remote the HTR ISAPI filter mapping from IIS and use Microsoft Active
Directory Service Interfaces for handling accounts remotely.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.5
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 10371 (iis_authentification_manager.nasl)
Bugtraq ID: 21104236
CVE ID: CVE-1999-0407CVE-2002-0421
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.