Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

27 lines
1.5 KiB

  1. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
  2. <HTML>
  3. <HEAD>
  4. <meta name="GENERATOR" content="Microsoft FrontPage 4.0">
  5. <Title>Disabling Scripting</Title>
  6. <STYLE type="text/css">
  7. BODY {background: #e0e0f0; font-family: Arial; font-size: 10pt}
  8. </STYLE>
  9. </HEAD>
  10. <H3>Disabling Scripting</H3>
  11. <P>IIS allows a user to set the script and execute permissions on a Virtual Directory separately
  12. from its Write permissions. Normally, administrators who wish to allow script and program execution on a virtual
  13. directory disallow writing to that virtual directory (this will keep clients from uploading executable scripts
  14. or programs to a directory and executing them).
  15. <P>However, when a virtual directory is enabled for BITS uploads, then even though Write permissions on the
  16. virtual directory has been disallowed, clients can write to this directory via BITS uploads. To protect the server,
  17. BITS disables all Script and Execute permissions on a BITS-Upload enabled Virtual Directory.
  18. To make sure that this virtual directory is secure, BITS Server extensions will check to make
  19. sure that these permissions are disabled before responding to any client request for uploading
  20. data. If these permissions are enabled at any time, BITS Server Extensions will deny all
  21. upload requests thereafter, until the permissions are disabled again. Every time the BITS Server
  22. extension denies a request in such an environment, it will write a log entry in the IIS logs.
  23. </BODY>
  24. </HTML>