Not sure if this is default behaviour, however on one of our Windows Server 2008 R2 boxes we've noticed one of our websites has .cer files under a folder called /scripts.
The .cer file contains ASP script which allows the intruder to browse the ENTIRE file system on the server, delete files, create files etc.
We've identified the security issue as to how this file managed to be created (FCKEditor security bug), however when browsing to:
The .cer file executes as an ASP script.
Having checked the handler mappings, we see .cer is mapped to %windir%\system32\inetsrv\asp.dll, which explains why the ASP script is being executed.
Is this default behaviour for IIS 7.5, and surely this is a security risk?