: IIS executes "malicious.asp;.txt" as ASP file. What the? I investigated a situation where 300+ websites hosted on an IIS server were pwned by a hacker. Investigation led me to a text file that
I investigated a situation where 300+ websites hosted on an IIS server were pwned by a hacker. Investigation led me to a text file that contained malicious ASP-classic code. The file was named dz.asp;.txt and I just realized that IIS happily executed this file without complaining.
So my question is: is this behavior normal? Shouldn't IIS treat this file as a .txt file instead of .asp?
More posts by @Megan663
1 Comments
Sorted by latest first Latest Oldest Best
It became known in 2009 that IIS had a vulnerability in that it determined filetype by the part of the filename preceeding a semicolon if there was one in the name.
See this NIST description for more details.
Terms of Use Create Support ticket Your support tickets Stock Market News! © vmapp.org2024 All Rights reserved.