CVE-2004-2320
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
31/12/2004
Last modified:
03/04/2025
Description
The default configuration of BEA WebLogic Server and Express 8.1 SP2 and earlier, 7.0 SP4 and earlier, 6.1 through SP6, and 5.1 through SP13 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.
Impact
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:bea:weblogic_server:5.1:*:express:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:*:win32:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp1:express:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp1:win32:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp10:*:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp10:express:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp10:win32:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp11:*:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp11:express:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp11:win32:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp12:*:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp12:express:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp12:win32:*:*:*:*:* | ||
cpe:2.3:a:bea:weblogic_server:5.1:sp13:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://dev2dev.bea.com/pub/advisory/68
- http://secunia.com/advisories/10726
- http://www.kb.cert.org/vuls/id/867593
- http://www.osvdb.org/3726
- http://www.securityfocus.com/bid/9506
- http://www.securitytracker.com/alerts/2004/Jan/1008866.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/14959
- http://dev2dev.bea.com/pub/advisory/68
- http://secunia.com/advisories/10726
- http://www.kb.cert.org/vuls/id/867593
- http://www.osvdb.org/3726
- http://www.securityfocus.com/bid/9506
- http://www.securitytracker.com/alerts/2004/Jan/1008866.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/14959