In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Internet_information_server | Microsoft | 3.0 (including) | 3.0 (including) |
Internet_information_server | Microsoft | 4.0 (including) | 4.0 (including) |
Internet_information_services | Microsoft | 2.0 (including) | 2.0 (including) |
Internet_information_services | Microsoft | 5.0 (including) | 5.0 (including) |