Microsoft URLScan 2.5, with the RemoveServerHeader option enabled, allows remote attackers to obtain sensitive information (server name and version) via an HTTP request that generates certain errors such as 400 "Bad Request," which leak the Server header in the response.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/sf/www-mobile/2003-q3/0021.html | Exploit |
http://secunia.com/advisories/9194 | Vendor Advisory |
http://www.osvdb.org/29370 | Exploit |
http://archives.neohapsis.com/archives/sf/www-mobile/2003-q3/0021.html | Exploit |
http://secunia.com/advisories/9194 | Vendor Advisory |
http://www.osvdb.org/29370 | Exploit |
Configurations
History
20 Nov 2024, 23:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/sf/www-mobile/2003-q3/0021.html - Exploit | |
References | () http://secunia.com/advisories/9194 - Vendor Advisory | |
References | () http://www.osvdb.org/29370 - Exploit |
Information
Published : 2003-12-31 05:00
Updated : 2024-11-20 23:46
NVD link : CVE-2003-1306
Mitre link : CVE-2003-1306
CVE.ORG link : CVE-2003-1306
JSON object : View
Products Affected
microsoft
- urlscan
CWE