Vulnerability CVE-2006-3918


Published: 2006-07-27   Modified: 2012-02-12

Description:
http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Write-up by Amit Klein: \"Forging HTTP request headers with Flash\"
Amit Klein (AKse...
01.08.2006

Vendor: IBM
Product: Http server 
Version: 6.1; 6.0;
Vendor: Apache
Product: Http server 
Version:
2.2.1
2.2
2.0.57
2.0
1.3.22
1.3.20
1.3.19
1.3.18
1.3.17
1.3.12
1.3.11
1.3.1
1.3

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None

 References:
http://secunia.com/advisories/21174
http://secunia.com/advisories/21172
http://www.vupen.com/english/advisories/2010/1572
http://www.vupen.com/english/advisories/2006/5089
http://www.vupen.com/english/advisories/2006/4207
http://www.vupen.com/english/advisories/2006/3264
http://www.vupen.com/english/advisories/2006/2964
http://www.vupen.com/english/advisories/2006/2963
http://www.securitytracker.com/id?1024144
http://www.redhat.com/support/errata/RHSA-2006-0619.html
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-2.html
http://www-1.ibm.com/support/docview.wss?uid=swg24013080
http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631
http://svn.apache.org/viewvc?view=rev&revision=394965
http://securitytracker.com/id?1016569
http://secunia.com/advisories/40256
http://secunia.com/advisories/21478
http://secunia.com/advisories/21399
http://rhn.redhat.com/errata/RHSA-2006-0618.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12238
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10352
http://marc.info/?l=bugtraq&m=130497311408250&w=2
http://marc.info/?l=bugtraq&m=130497311408250&w=2
http://marc.info/?l=bugtraq&m=129190899612998&w=2
http://marc.info/?l=bugtraq&m=129190899612998&w=2
http://marc.info/?l=bugtraq&m=125631037611762&w=2
http://marc.info/?l=bugtraq&m=125631037611762&w=2
http://archives.neohapsis.com/archives/bugtraq/2006-07/0425.html
http://archives.neohapsis.com/archives/bugtraq/2006-05/0151.html
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
http://www.ubuntu.com/usn/usn-575-1
http://www.securityfocus.com/bid/19661
http://www.novell.com/linux/security/advisories/2006_51_apache.html
http://www.debian.org/security/2006/dsa-1167
http://support.avaya.com/elmodocs2/security/ASA-2006-194.htm
http://securityreason.com/securityalert/1294
http://secunia.com/advisories/29640
http://secunia.com/advisories/28749
http://secunia.com/advisories/22523
http://secunia.com/advisories/22317
http://secunia.com/advisories/22140
http://secunia.com/advisories/21986
http://secunia.com/advisories/21848
http://secunia.com/advisories/21744
http://secunia.com/advisories/21598
http://rhn.redhat.com/errata/RHSA-2006-0692.html
http://openbsd.org/errata.html#httpd2
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html
http://kb.vmware.com/KanisaPlatform/Publishing/466/5915871_f.SAL_Public.html
ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P

Related CVE
CVE-2018-8042
Apache Ambari, version 2.5.0 to 2.6.2, passwords for Hadoop credential stores are exposed in Ambari Agent informational log messages when the credential store feature is enabled for eligible services. For example, Hive and Oozie.
CVE-2018-8011
By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.33).
CVE-2018-8024
In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause...
CVE-2018-1334
In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application.
CVE-2018-8007
Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their pri...
CVE-2018-1331
In Apache Storm 0.10.0 through 0.10.2, 1.0.0 through 1.0.6, 1.1.0 through 1.1.2, and 1.2.0 through 1.2.1, an attacker with access to a secure storm cluster in some cases could execute arbitrary code as a different user.
CVE-2018-8026
This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude ...
CVE-2018-8038
Versions of Apache CXF Fediz prior to 1.4.4 do not fully disable Document Type Declarations (DTDs) when either parsing the Identity Provider response in the application plugins, or in the Identity Provider itself when parsing certain XML-based parame...

Copyright 2018, cxsecurity.com

 

Back to Top