Microsoft Internet Information Services (IIS) 5.0 does not log requests that use the TRACK method, which allows remote attackers to obtain sensitive information without detection.
Weaknesses in this category are typically introduced during the configuration of the software.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0321.html | mailing list exploit |
http://www.osvdb.org/4864 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/14077 | vdb entry |
http://www.securityfocus.com/bid/9313 | vdb entry exploit |
http://www.aqtronix.com/Advisories/AQ-2003-02.txt | exploit |