In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
Software | From | Fixed in |
---|---|---|
microsoft / internet_information_services | 5.0 | 5.0.x |
microsoft / internet_information_server | 3.0 | 3.0.x |
microsoft / internet_information_server | 4.0 | 4.0.x |
microsoft / internet_information_services | 2.0 | 2.0.x |