ID CVE-2001-0333
Summary Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.
References
Vulnerable Configurations
  • Microsoft IIS 4.0
    cpe:2.3:a:microsoft:internet_information_server:4.0
  • Microsoft IIS 5.0
    cpe:2.3:a:microsoft:internet_information_server:5.0
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
  • description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (5). CVE-2001-0333 . Remote exploit for windows platform
    id EDB-ID:20839
    last seen 2016-02-02
    modified 2001-05-15
    published 2001-05-15
    reporter Leif Jakob
    source https://www.exploit-db.com/download/20839/
    title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 5
  • description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (2). CVE-2001-0333 . Remote exploit for windows platform
    id EDB-ID:20836
    last seen 2016-02-02
    modified 2001-05-16
    published 2001-05-16
    reporter HuXfLuX
    source https://www.exploit-db.com/download/20836/
    title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 2
  • description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (7). CVE-2001-0333 . Remote exploit for windows platform
    id EDB-ID:20841
    last seen 2016-02-02
    modified 2001-05-15
    published 2001-05-15
    reporter Gary O'Leary-Steele
    source https://www.exploit-db.com/download/20841/
    title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 7
  • description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (8). CVE-2001-0333 . Remote exploit for windows platform
    id EDB-ID:20842
    last seen 2016-02-02
    modified 2001-05-15
    published 2001-05-15
    reporter Roelof
    source https://www.exploit-db.com/download/20842/
    title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 8
  • description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (4). CVE-2001-0333 . Remote exploit for windows platform
    id EDB-ID:20838
    last seen 2016-02-02
    modified 2001-05-15
    published 2001-05-15
    reporter MovAX
    source https://www.exploit-db.com/download/20838/
    title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 4
  • description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (6). CVE-2001-0333 . Remote exploit for windows platform
    id EDB-ID:20840
    last seen 2016-02-02
    modified 2001-05-15
    published 2001-05-15
    reporter A.Ramos
    source https://www.exploit-db.com/download/20840/
    title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 6
  • description Microsoft IIS/PWS CGI Filename Double Decode Command Execution. CVE-2001-0333. Remote exploit for windows platform
    id EDB-ID:16467
    last seen 2016-02-01
    modified 2011-01-08
    published 2011-01-08
    reporter metasploit
    source https://www.exploit-db.com/download/16467/
    title Microsoft IIS/PWS CGI Filename Double Decode Command Execution
  • description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (1). CVE-2001-0333 . Remote exploit for windows platform
    id EDB-ID:20835
    last seen 2016-02-02
    modified 2001-05-15
    published 2001-05-15
    reporter Filip Maertens
    source https://www.exploit-db.com/download/20835/
    title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 1
  • description MS IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution (3). CVE-2001-0333 . Remote exploit for windows platform
    id EDB-ID:20837
    last seen 2016-02-02
    modified 2001-05-15
    published 2001-05-15
    reporter Cyrus The Gerat
    source https://www.exploit-db.com/download/20837/
    title Microsoft IIS 3.0/4.0/5.0 PWS Escaped Characters Decoding Command Execution 3
metasploit via4
description This module will execute an arbitrary payload on a Microsoft IIS installation that is vulnerable to the CGI double-decode vulnerability of 2001. NOTE: This module will leave a metasploit payload in the IIS scripts directory.
id MSF:EXPLOIT/WINDOWS/IIS/MS01_026_DBLDECODE
last seen 2019-03-12
modified 2017-07-24
published 2010-06-15
reliability Excellent
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/iis/ms01_026_dbldecode.rb
title MS01-026 Microsoft IIS/PWS CGI Filename Double Decode Command Execution
nessus via4
NASL family Web Servers
NASL id IIS_DECODE_BUG.NASL
description When IIS receives a user request to run a script, it renders the request in a decoded canonical form, and then performs security checks on the decoded request. A vulnerability results because a second, superfluous decoding pass is performed after the initial security checks are completed. Thus, a specially crafted request could allow an attacker to execute arbitrary commands on the IIS Server.
last seen 2019-02-21
modified 2018-11-15
plugin id 10671
published 2001-05-15
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=10671
title MS01-026 / MS01-044: Microsoft IIS Remote Command Execution (uncredentialed check)
oval via4
  • accepted 2007-08-02T14:47:14.863-04:00
    class vulnerability
    contributors
    • name Christine Walzer
      organization The MITRE Corporation
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    description Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.
    family windows
    id oval:org.mitre.oval:def:1018
    status accepted
    submitted 2004-05-12T12:00:00.000-04:00
    title Windows NT IIS Directory Traversal Command Execution (Test 2)
    version 27
  • accepted 2004-06-30T12:00:00.000-04:00
    class vulnerability
    contributors
    name Christine Walzer
    organization The MITRE Corporation
    description Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.
    family windows
    id oval:org.mitre.oval:def:1051
    status accepted
    submitted 2004-05-12T12:00:00.000-04:00
    title Windows 2000 IIS Directory Traversal Command Execution (Test 2)
    version 63
  • accepted 2016-02-08T10:00:00.000-05:00
    class vulnerability
    contributors
    name Tiffany Bergeron
    organization The MITRE Corporation
    description Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.
    family windows
    id oval:org.mitre.oval:def:37
    status accepted
    submitted 2003-10-10T12:00:00.000-04:00
    title Windows NT IIS Directory Traversal Command Execution (Test 1)
    version 26
  • accepted 2011-05-16T04:03:27.809-04:00
    class vulnerability
    contributors
    • name Tiffany Bergeron
      organization The MITRE Corporation
    • name Tiffany Bergeron
      organization The MITRE Corporation
    • name Shane Shaffer
      organization G2, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description Directory traversal vulnerability in IIS 5.0 and earlier allows remote attackers to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.
    family windows
    id oval:org.mitre.oval:def:78
    status accepted
    submitted 2003-10-10T12:00:00.000-04:00
    title Windows 2000 IIS Directory Traversal Command Execution (Test 1)
    version 32
packetstorm via4
refmap via4
bid 2708
bugtraq 20010515 NSFOCUS SA2001-02 : Microsoft IIS CGI Filename Decode Error Vulnerability
cert CA-2001-12
ms MS01-026
xf iis-url-decoding(6534)
saint via4
bid 2708
description IIS Double Decoding Directory Traversal
id web_server_iis_double
osvdb 556
title iis_double_decode
type remote
Last major update 17-10-2016 - 22:10
Published 27-06-2001 - 00:00
Last modified 12-10-2018 - 17:30
Back to Top