The information in this article applies to:
SUMMARY
A computer running Internet Information Server (IIS) may be vulnerable to
attack if the following conditions are true:
MORE INFORMATION
Folders that are used for file uploading, such as folders used with
Posting Acceptor, need to be given Write access in the Internet Service
Manager (ISM) snap-in for the Microsoft Management Console (MMC). If
Execute permissions are also granted in the ISM, a malicious user could
upload an executable file and run it on the computer running IIS.
If you click Yes, you potentially expose the server to attack. To prevent malicious attack, never allow Write and Execute permissions on an NTFS volume exposed to the Internet. As an additional level of security, set the IIS SSIExecDisable property to True on the IIS Web server to disable Server-Side Includes (SSI) from executing. To disable SSI from executing on a server with Windows Script Host (WSH) enabled, follow these steps:
Additional query words: ACL ACLs privileges hack hackers #exec Executable Content
Keywords : |
Last Reviewed: July 13, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |