[原文]Microsoft URLScan 2.5, with the RemoveServerHeader option enabled, allows remote attackers to obtain sensitive information (server name and version) via an HTTP request that generates certain errors such as 400 "Bad Request," which leak the Server header in the response.
URLScan Malformed Request Server/Version Information Disclosure
Remote / Network Access
Loss of Confidentiality
URLScan contains a flaw that may lead to an unauthorized information disclosure. By sending a malformed HTTP request, URLScan fails to properly handle the request and the returned response that may contain a server field with the underlying web server name and version.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.