CVE-2003-1567
https://notcve.org/view.php?id=CVE-2003-1567
The undocumented TRACK method in Microsoft Internet Information Services (IIS) 5.0 returns the content of the original request in the body of the response, which makes it easier for remote attackers to steal cookies and authentication credentials, or bypass the HttpOnly protection mechanism, by using TRACK to read the contents of the HTTP headers that are returned in the response, a technique that is similar to cross-site tracing (XST) using HTTP TRACE. El método no documentado TRACK en Microsoft Internet Information Services (IIS) v5.0 devuelve el contenido de la petición original en el cuerpo de la respuesta, lo que facilita a atacantes remotos el robo de cookies y credenciales de autenticación, o evitar el mecanismo de protección HttpOnly, usando TRAK para leer los contenidos de las cabeceras HTTP que se devuelven en la respuesta. Una técnica similar al rastreo de sitios cruzados (XST) usando HTTP TRACE. • http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0321.html http://www.aqtronix.com/Advisories/AQ-2003-02.txt http://www.kb.cert.org/vuls/id/288308 http://www.osvdb.org/5648 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2003-1566 – Microsoft IIS 5.0 - Failure To Log Undocumented TRACK Requests
https://notcve.org/view.php?id=CVE-2003-1566
Microsoft Internet Information Services (IIS) 5.0 does not log requests that use the TRACK method, which allows remote attackers to obtain sensitive information without detection. Microsoft Internet Information Services (IIS) v5.0 no registra las peticiones que usan el método TRACK, lo que permite a atacantes remotos obtener información sensible sin ser detectados. • https://www.exploit-db.com/exploits/23490 http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0321.html http://www.aqtronix.com/Advisories/AQ-2003-02.txt http://www.osvdb.org/4864 http://www.securityfocus.com/bid/9313 https://exchange.xforce.ibmcloud.com/vulnerabilities/14077 • CWE-16: Configuration •
CVE-2008-1446
https://notcve.org/view.php?id=CVE-2008-1446
Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability." Desbordamiento de entero en la extensión Internet Printing Protocol (IPP) ISAPI en Microsoft Internet Information Services (IIS) v5.0 hasta v7.0 en Windows 2000 SP4, XP SP2 y SP3, Server 2003 SP1 y SP2, y Server 2008, permite a atacantes remotos autenticados ejecutar código arbitrario a través de un petición HTTP POST que dispara un conexión IPP de salida desde un servidor Web a la máquina manejada por el atacante, también conocida como "Vulnerabilidad de servicio por Desbordamiento de entero en IPP". • http://marc.info/?l=bugtraq&m=122479227205998&w=2 http://secunia.com/advisories/32248 http://www.kb.cert.org/vuls/id/793233 http://www.securityfocus.com/bid/31682 http://www.securitytracker.com/id?1021048 http://www.us-cert.gov/cas/techalerts/TA08-288A.html http://www.vupen.com/english/advisories/2008/2813 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-062 https://exchange.xforce.ibmcloud.com/vulnerabilities/45545 https://exchange.xforce.ibmc • CWE-190: Integer Overflow or Wraparound •
CVE-2008-0074
https://notcve.org/view.php?id=CVE-2008-0074
Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders. Vulnerabilidad no especificada en Microsoft Internet Information Services (IIS) de 5.0 a 7.0. Permite a usuarios locales conseguir privilegios a través de vectores desconocidos relacionados a notificaciones de cambios de archivos en las carpetas TPRoot, NNTPFile\Root, or WWWRoot. • http://marc.info/?l=bugtraq&m=120361015026386&w=2 http://secunia.com/advisories/28849 http://www.securityfocus.com/bid/27101 http://www.securitytracker.com/id?1019384 http://www.us-cert.gov/cas/techalerts/TA08-043C.html http://www.vupen.com/english/advisories/2008/0507/references https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-005 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5389 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2007-2815 – Microsoft IIS 5.1 - Hit Highlighting Authentication Bypass
https://notcve.org/view.php?id=CVE-2007-2815
The "hit-highlighting" functionality in webhits.dll in Microsoft Internet Information Services (IIS) Web Server 5.0 only uses Windows NT ACL configuration, which allows remote attackers to bypass NTLM and basic authentication mechanisms and access private web directories via the CiWebhitsfile parameter to null.htw. La funcionalidad "hit-highlighting" en la biblioteca webhits.dll en el Servidor web versión 5.0 de Internet Information Services (IIS) de Microsoft solo usa la configuración ACL de Windows NT, lo que permite a los atacantes remotos omitir los mecanismos de autenticación básicos y NTLM y acceder a los directorios web privados por medio del parámetro CiWebhitsfile en null.htw. • https://www.exploit-db.com/exploits/4016 http://osvdb.org/41091 http://securityreason.com/securityalert/2725 http://support.microsoft.com/kb/328832 http://www.securityfocus.com/archive/1/469238/100/0/threaded http://www.securityfocus.com/bid/24105 • CWE-264: Permissions, Privileges, and Access Controls •