In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Internet_information_server | Microsoft | 3.0 | 3.0 |
Internet_information_server | Microsoft | 4.0 | 4.0 |
Internet_information_services | Microsoft | 2.0 | 2.0 |
Internet_information_services | Microsoft | 5.0 | 5.0 |