Unrated severityNVD Advisory· Published Dec 31, 2004· Updated Apr 16, 2026
CVE-2004-2320
CVE-2004-2320
Description
The default configuration of BEA WebLogic Server and Express 8.1 SP2 and earlier, 7.0 SP4 and earlier, 6.1 through SP6, and 5.1 through SP13 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.
Affected products
85cpe:2.3:a:bea:weblogic_server:5.1:*:express:*:*:*:*:*+ 84 more
- cpe:2.3:a:bea:weblogic_server:5.1:*:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:*:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp1:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp1:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp10:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp10:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp10:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp11:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp11:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp11:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp12:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp12:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp12:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp6:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp6:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp6:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp7:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp7:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp7:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp8:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp8:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp8:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp9:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp9:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp9:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:*:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp1:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp1:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp2:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp2:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp3:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp3:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp4:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp4:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp5:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp13:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp13:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp13:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp2:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp2:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp3:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp3:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp4:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp4:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp5:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp5:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp5:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp6:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:*:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp1:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp2:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp3:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp4:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- dev2dev.bea.com/pub/advisory/68nvdPatchVendor Advisory
- www.securityfocus.com/bid/9506nvdPatch
- www.securitytracker.com/alerts/2004/Jan/1008866.htmlnvdPatch
- secunia.com/advisories/10726nvdVendor Advisory
- www.kb.cert.org/vuls/id/867593nvdThird Party AdvisoryUS Government Resource
- www.osvdb.org/3726nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/14959nvd
News mentions
0No linked articles in our index yet.