http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
07 Nov 2023, 01:59
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
21 Sep 2022, 19:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
First Time |
Redhat enterprise Linux Server
Debian Redhat Debian debian Linux Redhat enterprise Linux Workstation Canonical Canonical ubuntu Linux |
|
References | (DEBIAN) http://www.debian.org/security/2006/dsa-1167 - Third Party Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=130497311408250&w=2 - Issue Tracking, Mailing List, Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/usn-575-1 - Third Party Advisory | |
References | (CONFIRM) http://kb.vmware.com/KanisaPlatform/Publishing/466/5915871_f.SAL_Public.html - Third Party Advisory | |
References | (SECTRACK) http://securitytracker.com/id?1016569 - Broken Link, Third Party Advisory, VDB Entry | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2006-0692.html - Third Party Advisory | |
References | (CONFIRM) http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/21174 - Not Applicable, Patch, Vendor Advisory | |
References | (SREASON) http://securityreason.com/securityalert/1294 - Exploit, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/21744 - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/21986 - Not Applicable | |
References | (MLIST) https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (CONFIRM) http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-2.html - Third Party Advisory | |
References | (BUGTRAQ) http://archives.neohapsis.com/archives/bugtraq/2006-07/0425.html - Broken Link, Exploit | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/1572 - Permissions Required | |
References | (MLIST) https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2006/5089 - Permissions Required | |
References | (VUPEN) http://www.vupen.com/english/advisories/2006/2964 - Permissions Required | |
References | (SECUNIA) http://secunia.com/advisories/21848 - Not Applicable | |
References | (VUPEN) http://www.vupen.com/english/advisories/2006/4207 - Permissions Required | |
References | (SECTRACK) http://www.securitytracker.com/id?1024144 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MLIST) https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (CONFIRM) http://svn.apache.org/viewvc?view=rev&revision=394965 - Exploit, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/28749 - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/21478 - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/21172 - Not Applicable, Patch, Vendor Advisory | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2006-0619.html - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/22140 - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/40256 - Not Applicable | |
References | (VUPEN) http://www.vupen.com/english/advisories/2006/2963 - Permissions Required | |
References | (SECUNIA) http://secunia.com/advisories/22523 - Not Applicable | |
References | (BID) http://www.securityfocus.com/bid/19661 - Third Party Advisory, VDB Entry | |
References | (SUSE) http://www.novell.com/linux/security/advisories/2006_51_apache.html - Third Party Advisory | |
References | (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2006-194.htm - Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (AIXAPAR) http://www-1.ibm.com/support/docview.wss?uid=swg24013080 - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2006-0618.html - Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2006/3264 - Permissions Required | |
References | (HP) http://marc.info/?l=bugtraq&m=129190899612998&w=2 - Issue Tracking, Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/21399 - Not Applicable | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10352 - Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/21598 - Not Applicable | |
References | (AIXAPAR) http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631 - Third Party Advisory | |
References | (BUGTRAQ) http://archives.neohapsis.com/archives/bugtraq/2006-05/0151.html - Broken Link, Exploit | |
References | (OPENBSD) http://openbsd.org/errata.html#httpd2 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/22317 - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/29640 - Not Applicable | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12238 - Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (SGI) ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P - Broken Link | |
References | (HP) http://marc.info/?l=bugtraq&m=125631037611762&w=2 - Issue Tracking, Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
CPE | cpe:2.3:a:apache:http_server:1.3.11:*:win32:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.12:*:win32:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:* cpe:2.3:a:ibm:http_server:6.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_server:2.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:2.0:*:*:*:*:*:*:* |
06 Jun 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jun 2021, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Mar 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2006-07-28 00:04
Updated : 2023-12-10 10:28
NVD link : CVE-2006-3918
Mitre link : CVE-2006-3918
CVE.ORG link : CVE-2006-3918
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_server
canonical
- ubuntu_linux
debian
- debian_linux
apache
- http_server
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')