Vulnerability Details : CVE-2003-1567
Potential exploit
The undocumented TRACK method in Microsoft Internet Information Services (IIS) 5.0 returns the content of the original request in the body of the response, which makes it easier for remote attackers to steal cookies and authentication credentials, or bypass the HttpOnly protection mechanism, by using TRACK to read the contents of the HTTP headers that are returned in the response, a technique that is similar to cross-site tracing (XST) using HTTP TRACE.
Products affected by CVE-2003-1567
- cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*
Threat overview for CVE-2003-1567
Top countries where our scanners detected CVE-2003-1567
Top open port discovered on systems with this issue
80
IPs affected by CVE-2003-1567 116
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2003-1567!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2003-1567
82.69%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-1567
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST |
CWE ids for CVE-2003-1567
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2003-1567
-
http://www.aqtronix.com/Advisories/AQ-2003-02.txt
Exploit
-
http://www.osvdb.org/5648
Exploit
-
http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0321.html
Exploit
-
http://www.kb.cert.org/vuls/id/288308
US Government Resource
Jump to