Korean
<< Back
VID 22152
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Web server supports the TRACE and/or TRACK methods. It has been shown that servers supporting this method are subject to cross-site-scripting attacks, dubbed XST for 'Cross-Site-Tracing', when used in conjunction with various weaknesses in browsers.
WhiteHat Security, Inc. that specializes in Web Application Security, has discovered a serious security flaw affecting all web server world wide. From months of extensive research and testing, WhiteHat has found a way to exploit a flaw in the way all web servers communicate.
The vulnerability exploits a flaw in the TRACE method which is used to debug web server connections. This is a rarely used portion of the HTTP protocol but is turned on by default in all major web servers. TRACE is part of the HTTP protocol specification, making it somewhat difficult to remove.
Using this vulnerability, an attacker could create a web site that steals User Passwords to access E-commerce sites, Online banks, and Web based e-mail systems from every user that visits that page. This malicious web page could be e-mailed to people to extend the number of people attacked.

* References:
http://www.kb.cert.org/vuls/id/867593
http://archives.neohapsis.com/archives/bugtraq/2003-01/0230.html
http://www.ietf.org/rfc/rfc2616.txt
http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf
http://www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf
http://www.whitehatsec.com/press_releases/WH-PR-20030120.txt

* Platforms Affected:
Any HTTP Server Any version
Any operating system Any version
Recommendation Disable TRACE and(or) TRACK methods from the affected web server.

For Microsoft IIS:
By using URLScan, these methods will be filtered by default. URLScan is available from http://www.microsoft.com/technet/security/tools/tools/urlscan.asp
Urlscan is a powerful security tool that works in conjunction with the IIS Lockdown Tool ( http://www.microsoft.com/technet/security/tools/tools/locktool.asp ) to give IIS Web site administrators the ability to turn off unneeded features and restrict the kind of HTTP requests that the server will process. By blocking specific HTTP requests, the Urlscan security tool prevents potentially harmful requests from reaching the server and causing damage.

For Apache distribution:
Add 'TraceEnable Off' lines in httpd.conf file.
restart Apache server.

For Apache prior 1.3.34, 2.0.55 distribution:
You can disable it by using the functionality of an Apache module, mod_rewrite. This module provides a rule-based rewriting engine to rewrite requested URLs on the fly. To be able to use the functionality of a module which was built as a Dynamic Shared Object (DSO) you have to place corresponding 'LoadModule' lines in httpd.conf file.

1. Open the [Apache home directory]/conf/httpd.conf file.
2. Locate the line including the text ""LoadModule rewrite_module"". If '#' at the beginning of the line is exists, remove it.
3. Ensure that [module directory] and [module name] in the line are correct. [module directory] is located under [Apache home directory] and its name is usually used as 'modules' or 'libexec'. [module name] is usually named as 'mod_rewrite.so', 'rewrite', or 'ApacheModuleRewrite.dll' on Windows platform.
LoadModule rewrite_module [module directory]/[module name]
4. If ""AddModule rewrite_module.c"" line is required, locate the line including the text ""AddModule rewrite_module.c"" and If '#' at the beginning of the line is exists, remove it.
5. Add the following three lines under the configured lines above:
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^TRACE
RewriteRule .* - [F]
6. Revoke httpd daemon:
[Apache home directory]/bin/apachctl restart

For HP-UX:
Follow the HP-UX security bulletins digest, as listed in Hewlett-Packard Company Security Bulletin HPSBUX0309-279 at http://archives.neohapsis.com/archives/hp/2003-q3/0053.html

For Sun ONE/iPlanet Web Server:
Apply the appropriate patch for your system, as listed in Sun Alert Notification 50603 at http://sunsolve.sun.com/search/document.do?assetkey=1-26-50603-1

For Sun Java System Application Server:
Apply the appropriate patch for your system, as listed in Sun Alert Notification 57670 at http://sunsolve.sun.com/search/document.do?assetkey=1-26-57670-1

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL (CVE)
Related URL 9561,11604 (SecurityFocus)
Related URL 11237,11149 (ISS)