Initial Publication Date: Advisory Status: Advisory Severity: CVSS Base Score:Legacy ID
15 Sep 2011 Closed Low CVSS v2: 3.3 SA62
An attacker can use the HTTP TRACE method to echo malicious script back to the client as part of a Cross Site Scripting (XSS) attack. No authentication is required.
All versions of Director prior to 126.96.36.199 are vulnerable.
Director 5.5 - an interim fix is available in 188.8.131.52.
Director 5.4 and earlier - please upgrade to a later release.
No CVEs are associated with this vulnerability.
Director is vulnerable to reflected (non-persistent) cross site scripting attacks. User provided data is not validated or sanitized prior to returning it in response to an HTTP TRACE method issued from the client.
The attacker cannot use this vulnerability to steal the administrator's cookies and impersonate the administrator on another machine. The attacker can use this vulnerability to execute malicious script on the client machine.
Customers can limit the impact of this vulnerability by managing Director only from dedicated machines that do not connect to any other internal or external websites.