First published: Wed Jun 10 2009(Updated: )
The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.0 allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a %c0%af (Unicode / character) at an arbitrary position in the URI, as demonstrated by inserting %c0%af into a "/protected/" initial pathname component to bypass the password protection on the protected\ folder, aka "IIS 5.1 and 6.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1122.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Information Services (IIS) | =5.1 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Internet Information Services (IIS) | =6.0 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows XP | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1535 has a moderate severity level, allowing unauthorized access due to URI-based protection bypass.
To fix CVE-2009-1535, it is recommended to upgrade to a patched version of Microsoft Internet Information Services or apply the necessary security patches.
CVE-2009-1535 affects Microsoft Internet Information Services (IIS) version 5.1 and 6.0.
Yes, CVE-2009-1535 can be exploited remotely by attackers using crafted URIs.
CVE-2009-1535 can facilitate attacks that allow remote attackers to list folders, read, create, or modify files on affected servers.