2020-10-24 21:21:17 +00:00
id : iis-shortname
2022-04-22 10:38:41 +00:00
2020-10-24 21:21:17 +00:00
info :
2023-03-08 16:02:58 +00:00
name : IIS - Short Name Detect
2020-10-24 21:21:17 +00:00
author : nodauf
severity : info
2023-03-08 16:02:58 +00:00
description : A website running via IIS on an old .net framework contains a get request vulnerability. Using the the tilde character "~" in the request, an attacker can locate short names of files and folders not normally visible.
2021-08-18 11:37:49 +00:00
reference :
2021-08-19 14:44:46 +00:00
- https://github.com/lijiejie/IIS_shortname_Scanner
- https://www.exploit-db.com/exploits/19525
2023-03-08 16:02:58 +00:00
- http://soroush.secproject.com/blog/2012/06/microsoft-iis-tilde-character-vulnerabilityfeature-short-filefolder-name-disclosure/
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
2023-10-14 11:27:55 +00:00
cvss-score : 0
2023-03-08 16:02:58 +00:00
cwe-id : CWE-200
2023-04-28 08:11:21 +00:00
metadata :
max-request : 4
2023-10-14 11:27:55 +00:00
tags : fuzz,edb
2020-10-24 21:21:17 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-03-09 08:12:02 +00:00
- raw :
- |
GET /N0t4xist*~1*/a.aspx HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
- |
GET /*~1*/a.aspx' HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
- |
OPTIONS /N0t4xist*~1*/a.aspx HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
- |
OPTIONS /*~1*/a.aspx' HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
2020-10-24 21:21:17 +00:00
2021-03-11 12:44:19 +00:00
req-condition : true
2020-10-24 21:21:17 +00:00
matchers :
- type : dsl
dsl :
- "status_code_1!=404 && status_code_2 == 404 || status_code_3 != 404 && status_code_4 == 404"