Preemptive Protection against Sun Java System Application Server HTTP TRACE Method Vulnerability
|Category:||Unsafe HTTP Methods|
|Vulnerable Systems:||Sun Java System Application Server Standard Edition 7 and later updates;
Sun Java System Application Server Standard Edition 7 2004Q2 and later updates;
Sun Java System Application Server Platform Edition 7 and later updates
Sunsolve ID: 57670
A vulnerability exists in the way the Sun Java System Application server processes a specific HTTP method. A remote attacker can abuse this method to obtain sensitive information about the Web server, including server cookies and authentication information.
The HTTP TRACE method is typically used for debugging and network analysis purposes to request the contents of HTTP request messages received by the Web server. When an HTTP TRACE request is sent to a web server that supports it, that server will respond echoing the data that is passed to it, including any HTTP headers.
Users of VPN-1 NG with Application Intelligence R54, R55 and users of VPN-1 NG with Application Intelligence R55W with Web Intelligence license who have applied the solution outlined below, will be able to identify blocked HTTP connections with the following SmartView Tracker logging entries:
Log for R55
Log for R55W
Users of VPN-1 NG with Application Intelligence R54, R55, R55W and Connectra are preemptively protected against this vulnerability.
VPN-1 HTTP Security Server (R54, R55) and Web Intelligence (R55W, Connectra) block the HTTP TRACE method along with other unsafe HTTP methods by default.
To enable the protection (R54, R55):
To enable the protection (R55W & Connectra with Web Intelligence license):
1. On the Web Intelligence navigation tree, click HTTP Protocol Inspection > HTTP Methods.
2. Select Selected HTTP Methods and click Add; the Select Blocked HTTP Methods window appears.
3.Select TRACE, click OK.
4. Install policy on all modules.