How could a user tell which files are accessed by UNC shares?
Under normal conditions, they would be unable to tell. Web server software deliberately makes it appear that all data resides on the server, by using so-called virtual directories. For example, when you request a page from www.microsoft.com/security, the “security” virtual directory may contain files that all reside on one server or are distributed across many. This is done primarily to simplify the user experience, but it also has the effect of making it more difficult to exploit this vulnerability.
Related Questions
- Can the RTAS interface be accessed by its user only at a workstation within the physical confines of the customers corporate office?
- Say I have a VPN user and a user on my local network. Can the local user access shares and services on the VPN users system?
- Doesn the vulnerability require the user to click on the file: URL or UNC string in the malicious web page?