Skip to main content

CVE-1999-1397: Index Server 2.0 on IIS 4.0 stores physical path information in the ContentIndex\Catalogs subkey of

High
VulnerabilityCVE-1999-1397cve-1999-1397
Published: Tue Mar 23 1999 (03/23/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: index_server

Description

Index Server 2.0 on IIS 4.0 stores physical path information in the ContentIndex\Catalogs subkey of the AllowedPaths registry key, whose permissions allows local and remote users to obtain the physical paths of directories that are being indexed.

AI-Powered Analysis

AILast updated: 06/28/2025, 03:10:30 UTC

Technical Analysis

CVE-1999-1397 is a high-severity vulnerability affecting Microsoft Index Server 2.0 running on Internet Information Services (IIS) 4.0. The vulnerability arises because Index Server 2.0 stores physical path information in the Windows registry under the ContentIndex\Catalogs subkey of the AllowedPaths key. The permissions on this registry key are insufficiently restrictive, allowing both local and remote users to read it. This exposure enables attackers to obtain the physical directory paths that are being indexed by the server. Since these paths reveal the underlying directory structure of the web server, an attacker can leverage this information to facilitate further attacks such as directory traversal, information disclosure, or targeted exploitation of known vulnerabilities in specific directories or files. The CVSS score of 7.5 (high) reflects the fact that the vulnerability is remotely exploitable without authentication (AV:N/AC:L/Au:N) and impacts confidentiality, integrity, and availability (C:P/I:P/A:P). Although no patches are available and no known exploits have been reported in the wild, the vulnerability remains a significant risk due to the sensitive nature of the information disclosed and the ease of exploitation.

Potential Impact

For European organizations, this vulnerability poses a notable risk especially for those still operating legacy systems with IIS 4.0 and Index Server 2.0, which may be found in industrial, governmental, or legacy enterprise environments. Disclosure of physical directory paths can aid attackers in mapping the internal structure of web servers, increasing the likelihood of successful follow-up attacks such as privilege escalation, data exfiltration, or service disruption. Given the high confidentiality, integrity, and availability impact, exploitation could lead to unauthorized access to sensitive data, modification of critical files, or denial of service. This is particularly concerning for organizations subject to strict data protection regulations such as GDPR, where unauthorized data exposure can lead to regulatory penalties and reputational damage. Although modern environments have largely deprecated IIS 4.0 and Index Server 2.0, some legacy systems may still be in use, especially in sectors with long hardware/software lifecycles.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should prioritize the following mitigations: 1) Identify and inventory all systems running IIS 4.0 with Index Server 2.0 to assess exposure. 2) Restrict access to the registry keys containing the physical path information by tightening permissions to allow only trusted administrators. 3) Isolate legacy systems from external networks using network segmentation and firewalls to prevent remote exploitation. 4) Disable or uninstall Index Server 2.0 if it is not required, or upgrade to supported versions of IIS and search services that do not exhibit this vulnerability. 5) Monitor network traffic and system logs for unusual access patterns that could indicate reconnaissance or exploitation attempts. 6) Implement compensating controls such as application-layer firewalls or intrusion detection systems to detect and block attempts to access sensitive registry information remotely.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7def1f

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/28/2025, 3:10:30 AM

Last updated: 8/15/2025, 9:21:00 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats