Upstream information
Description
The default configuration of BEA WebLogic Server and Express 8.1 SP2 and earlier, 7.0 SP4 and earlier, 6.1 through SP6, and 5.1 through SP13 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 5.8 |
Vector | AV:N/AC:M/Au:N/C:P/I:P/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | None |
Note from the SUSE Security Team
The SUSE Linux Enterprise default apache2 configuration still allows the 'TRACE' primitive, as the apache httpd team does not consider this a specific server side vulnerability. Please refer to their page for more discussion and a method to disable TRACE using mod_rewrite. SUSE Bugzilla entry: 1058233 [RESOLVED / FIXED] No SUSE Security Announcements cross referenced.SUSE Timeline for this CVE
CVE page created: Fri Jun 28 01:30:16 2013CVE page last modified: Fri Oct 7 12:45:29 2022