Security vulnerability indicates that Microsoft IIS default installation/welcome page installed on Director
Vulnerability Title:Microsoft IIS default installation/welcome page installed
Vulnerability Description:The IIS default installation or "Welcome" page is installed on this server. This usually indicates a newly installed server which has not yet been configured properly and which may not be known about.
In many cases, IIS is installed by default and the user may not be aware that the web server is running. These servers are rarely patched and rarely monitored, providing hackers with a convenient target that is not likely to trip any alarms.
Vulnerability Proof:* Running HTTPS service
* Product IIS exists -- Microsoft IIS
HTTP GET request to
HTTP response code was an expected 200
HTTP header 'Content-Location' not present
HTTP response code was an expected 200HTTP response code was an expected 200HTTP response code was an expected 200HTTP response code was an expected 200HTTP response code was an expected 200HTTP response code was an expected 200HTTP response code was an expected 200HTTP response code was an expected 200
1: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN""http://ww... 2: <html xmlns="http://www.w3.org/1999/xhtml"> 3: <head> 4: IIS Windows Server</title>
Customer try to disable the default.htm in default document on IIS, but Director can't open successfully after that