CVE-2004-2320

The default configuration of BEA WebLogic Server and Express 8.1 SP2 and earlier, 7.0 SP4 and earlier, 6.1 through SP6, and 5.1 through SP13 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bea:weblogic_server:5.1:*:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:*:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp1:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp1:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp10:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp10:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp10:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp11:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp11:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp11:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp12:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp12:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp12:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp13:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp13:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp13:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp2:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp2:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp3:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp3:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp4:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp4:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp5:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp5:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp5:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp6:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp6:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp6:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp7:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp7:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp7:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp8:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp8:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp8:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp9:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp9:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp9:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:*:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp1:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp1:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp2:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp2:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp3:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp3:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp4:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp4:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp5:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp6:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:*:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp1:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp2:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp3:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp4:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*

History

20 Nov 2024, 23:53

Type Values Removed Values Added
References () http://dev2dev.bea.com/pub/advisory/68 - Patch, Vendor Advisory () http://dev2dev.bea.com/pub/advisory/68 - Patch, Vendor Advisory
References () http://secunia.com/advisories/10726 - Vendor Advisory () http://secunia.com/advisories/10726 - Vendor Advisory
References () http://www.kb.cert.org/vuls/id/867593 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/867593 - Third Party Advisory, US Government Resource
References () http://www.osvdb.org/3726 - () http://www.osvdb.org/3726 -
References () http://www.securityfocus.com/bid/9506 - Patch () http://www.securityfocus.com/bid/9506 - Patch
References () http://www.securitytracker.com/alerts/2004/Jan/1008866.html - Patch () http://www.securitytracker.com/alerts/2004/Jan/1008866.html - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/14959 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/14959 -

Information

Published : 2004-12-31 05:00

Updated : 2024-11-20 23:53


NVD link : CVE-2004-2320

Mitre link : CVE-2004-2320

CVE.ORG link : CVE-2004-2320


JSON object : View

Products Affected

bea

  • weblogic_server
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor