'; echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "www.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "www.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "www.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "www.hp-telecom.com") { echo ''; echo 'hp-telecom'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

HTTP Attack (Attack ID:300646)

Release Date:2009-09-27

Attack Name:Service.cnf access

OS Type:Window

Application Type

Severity:Info

BUG ID

CVE ID

 

Description

On systems running Microsoft Frontpage Extensions on IIS or Apache web servers the file _vti_pvt/service.cnf exists which may contain sensitive information about the web server. This file is meant to be only used internally by FPSE and never directly by the user.

Impact:
If successful, the attacker can read sensitive data about the Frontpage web.

Affected Systems:
Systems using Microsoft FrontPage Server Extensions 98.

Additional References:
http://support.microsoft.com/default.aspx?scid=http://support.microsoft.com:80/support/kb/articles/Q188/2/57.ASP&NoWebContent=1&NoWebContent=1
http://cgi.nessus.org/plugins/dump.php3?id=10575

 

Solution

Disable direct access to the file /_vti_pvt/service.cnf.