Will %20 disappear with httpinspect?
Rule:

--
Sid:
978

--
Summary:
This event is generated when an attempt is made to disclose the contents of a file on an Internet Information Service (IIS) host. 

--
Impact:
Intelligence gathering activity.  This attack can display the contents of an Activer Server Page (ASP) file or other files located on the server. 

--
Detailed Information:
A vulnerability exists in Windows NT 4.0 Option Pack and Windows 2000 Index Server.  The Index Server is a search engine used by IIS that allows a user's browser to search for text in HTML and other documents.   The Index Server has a Hit-Hightlighting component that highlights the text that satisifies the user's query.  A vulnerability exists in the webhits.dll file that allows disclosure of file contents when a URL is crafted to contain a hex-encoded space "%20" after the file name passed to webhits.dll and setting 'CiHiliteType' to 'Full' and 'CiRestriction' to 'none'

--
Affected Systems:
Hosts running Microsoft Index Server 2.0

--
Attack Scenarios:
An attacker can attempt to disclose the contents of a file by crafting a special URL to access the Hit-Highlighting component of the Index Server. 

--
Ease of Attack:
Simple. 

--
False Positives:
None Known.

--
False Negatives:
None Known.

--
Corrective Action:
Apply the patch discussed in the referenced Microsoft Bulletin.
 
--
Contributors:
Original rule writer unknown
Modified by Brian Caswell <bmc@sourcefire.com>
Sourcefire Research Team
Judy Novak <judy.novak@sourcefire.com>

--
Additional References:

Bugtraq
http://www.securityfocus.com/bid/1084

CVE
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2000-0302

Microsoft
http://www.microsoft.com/technet/security/bulletin/ms00-006.asp

--
