Microsoft IIS WebDAV Unicode Request Directory Security Bypass

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.


Synopsis :

It is possible to access protected resources through WebDAV.

Description :

IIS 6.0 does not properly sanitize WebDAV requests. It is possible
to access protected resources by inserting a Unicode / (%c0%af) in the
URL.

Depending on the remote server configuration, protected resources may
be browsed, read and/or modified.

See also :

http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html
http://www.nessus.org/u?36818b28
http://www.nessus.org/u?1884f451
https://isc.sans.edu/diary/IIS6.0+WebDav+Remote+Auth+Bypass/6397
http://technet.microsoft.com/en-us/security/advisory/971492
http://unixwiz.net/techtips/ms971492-webdav-vuln.html
http://forums.iis.net/t/1149348.aspx

Solution :

Disable WebDAV or update the server.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 38808 ()

Bugtraq ID: 34993

CVE ID: CVE-2009-1535

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now