Please note that the "workaround" has been documented in KB article Q218180 (http://support.microsoft.com/default.aspx?scid=KB;EN-US;Q218180&ID=KB;EN-US;Q218180) and has been discussed and referenced in the IIS4 and IIS5 security checklists (since June 2000.) From the IIS5 checklist (http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/tools/iis5chk.asp) Disable IP Address in Content-Location The Content-Location header can expose internal IP addresses that are usually hidden or masked behind a Network Address Translation (NAT) firewall or proxy server. Refer to Knowledge Base article Q218180 for further information about disabling this option. At 05:58 PM 3/5/2002 +0000, David Litchfield wrote: >NGSSoftware Insight Security Research Advisory > >Name: Internal IP Addresses and IIS >Systems Affected: Microsoft IIS 4/5/5.1 >Platforms: Windows NT/2000/XP >Severity: Low Risk >Vendor URL: http://www.microsoft.com/ >Author: David Litchfield (david@nextgenss.com) >Date: 4th March 2002 >Advisory number: #NISR05032002B >Advisory URL: http://www.nextgenss.com/advisories/iisip.txt > >Issue: Possible to discover internal IP addresses used > by IIS Servers > >Description >*********** >Microsoft's Internet Information Server offers web, ftp, mail and nntp >services. If the server is protected by a firewall using Network Address >Translation and the server uses a private internal IP address then, by >making a malformed request to the web service it is possible for an >attacker to discover this IP address. Whilst this won't come anywhere >near to allowing an attacker to compromise a IIS server it will help >them formulate further attacks. This issue is similar to the issue >documented at >http://support.microsoft.com/default.aspx?scid=KB;EN-US;Q218180&id=KB;EN >-US;Q218180 > > >Details >******* >By making certain requests to the web service with a blank Host HTTP >client header the server response will often contain the server's IP >address, for example when using the PROPFIND request method. > >PROPFIND / HTTP/1.1 >Host: >Content-Length: 0 > >The server will return a 207 Multi-Status response with certain >properties of the root page. The server's IP address will be revealed if >the HREF property. Using the WRITE or MKCOL method will return the >machine's IP address in the Location server HTTP header, though of >course if the server allows the WRITE and MKCOL methods then the server >has greater problems. > >Only IIS 5 and 5.1 support the WebDAV methods so these methods only >affect these systems. IIS 5.x and 4.0 are both vulnerable to this issue >if Basic authentication is enabled. (see #NISR05032002A >http://www.nextgenss.com/advisories/iisauth.txt) > > > > >Fix Information >*************** >To prevent internal IP address disclosure take the following steps. > >Open a command prompt and change the current directory to >c:\inetpub\adminscripts or to where the adminscripts can be found. > >Run the commands > >adsutil set w3svc/UseHostName True >net stop iisadmin /y >net start w3svc > >This will cause the IIS server to use the machine's host name rather >than its IP address. > > >Vendor Status >************* >Microsoft was informed of this issue. They didn't need to take any >action as a suitable work-around is available.