exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16467
This Metasploit module exploits the CGI double-decode vulnerability in Microsoft IIS/PWS to execute arbitrary commands by leveraging improper URL decoding. It copies cmd.exe to the web root and executes payloads via HTTP requests.
Classification
Working Poc 100%
Target:
Microsoft IIS/PWS (2001 vulnerability)
No auth needed
Prerequisites:
Network access to vulnerable IIS/PWS server · Target server must allow HTTP requests to /scripts/ directory
exploitdb
WORKING POC
VERIFIED
by HuXfLuX · cremotewindows
https://www.exploit-db.com/exploits/20836
This exploit targets a CGI filename decode vulnerability in Microsoft IIS (CVE-2001-0333), allowing remote command execution via double-decoding of malformed filenames. The PoC sends a crafted HTTP GET request to execute arbitrary commands with IUSR_machinename privileges.
Classification
Working Poc 95%
Target:
Microsoft IIS 3.0, 4.0, 5.0
No auth needed
Prerequisites:
Network access to vulnerable IIS server · Port 80 accessible
exploitdb
WRITEUP
VERIFIED
by Roelof · textremotewindows
https://www.exploit-db.com/exploits/20842
This is a detailed writeup describing a vulnerability in IIS where a flaw in CGI filename handling allows remote command execution due to double decoding. The vulnerability is exploited by malformed filenames bypassing security checks.
Classification
Writeup 90%
Target:
Microsoft IIS (versions not specified, but includes Personal Web Server 1.0 and 3.0)
No auth needed
Prerequisites:
Access to a vulnerable IIS server · Ability to send crafted HTTP requests
exploitdb
WRITEUP
VERIFIED
by Gary O'Leary-Steele · textremotewindows
https://www.exploit-db.com/exploits/20841
The writeup describes a flaw in IIS CGI filename handling where double decoding of malformed requests can lead to arbitrary command execution with IUSR_machinename privileges. This vulnerability is exploited by the Nimda worm and affects Personal Web Server 1.0 and 3.0.
Classification
Writeup 90%
Target:
Microsoft IIS, Personal Web Server 1.0, 3.0
No auth needed
Prerequisites:
Access to a vulnerable IIS server · Ability to send crafted HTTP requests
exploitdb
WRITEUP
VERIFIED
by A.Ramos · textremotewindows
https://www.exploit-db.com/exploits/20840
The writeup describes a vulnerability in IIS where a flaw in CGI filename handling allows remote command execution due to double decoding of malformed filenames. This bypasses security checks and executes commands with IUSR_machinename privileges.
Classification
Writeup 90%
Target:
Microsoft IIS (versions not specified, but includes Personal Web Server 1.0 and 3.0)
No auth needed
Prerequisites:
Access to a vulnerable IIS server · Ability to send crafted CGI requests
exploitdb
WORKING POC
VERIFIED
by Leif Jakob · bashremotewindows
https://www.exploit-db.com/exploits/20839
This exploit leverages a double-decoding flaw in IIS CGI handling to execute arbitrary commands via a malformed request. The script constructs a GET request with encoded traversal sequences to bypass security checks and execute `cmd.exe`.
Classification
Working Poc 95%
Target:
Microsoft IIS 4.0/5.0, Personal Web Server 1.0/3.0
No auth needed
Prerequisites:
netcat installed · target running vulnerable IIS/PWS version
exploitdb
WORKING POC
VERIFIED
by MovAX · cremotewindows
https://www.exploit-db.com/exploits/20838
This exploit targets a double-decoding vulnerability in Microsoft IIS (CVE-2001-0333) to achieve remote command execution. It crafts a malformed HTTP GET request with encoded traversal sequences to bypass security checks and execute arbitrary commands via cmd.exe.
Classification
Working Poc 95%
Target:
Microsoft IIS 4.0/5.0, Personal Web Server 1.0/3.0
No auth needed
Prerequisites:
Network access to vulnerable IIS server · Target directory with script execution permissions
exploitdb
WORKING POC
VERIFIED
by Cyrus The Gerat · perlremotewindows
https://www.exploit-db.com/exploits/20837
This Perl script exploits CVE-2001-0333, a double-decoding flaw in IIS 4/5 CGI handling, allowing remote command execution via malformed requests. It tests for vulnerability, copies cmd.exe if needed, and executes arbitrary commands.
Classification
Working Poc 95%
Target:
Microsoft IIS 4.0/5.0, Personal Web Server 1.0/3.0
No auth needed
Prerequisites:
Network access to vulnerable IIS server · Perl environment
exploitdb
WORKING POC
VERIFIED
by Filip Maertens · cremotewindows
https://www.exploit-db.com/exploits/20835
This exploit leverages a CGI filename decode error in Microsoft IIS to execute arbitrary commands via a malformed request. The vulnerability arises from double-decoding of the CGI filename, bypassing security checks.
Classification
Working Poc 95%
Target:
Microsoft IIS (versions affected include those running on Windows 2000 Server/Professional, Personal Web Server 1.0 and 3.0)
No auth needed
Prerequisites:
Network access to the target IIS server · IIS server with vulnerable CGI handling
metasploit
WORKING POC
EXCELLENT
by jduck · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/iis/ms01_026_dbldecode.rb
This Metasploit module exploits the CGI double-decode vulnerability in Microsoft IIS/PWS (CVE-2001-0333) to achieve remote command execution. It leverages directory traversal via encoded sequences to access cmd.exe and execute arbitrary commands or drop a payload.
Classification
Working Poc 100%
Target:
Microsoft IIS/PWS (2001 era, pre-MS01-026 patch)
No auth needed
Prerequisites:
Target running vulnerable IIS/PWS with accessible CGI scripts directory · Network access to TCP/80