CVE-2006-6276

HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors.
References
Link Resource
http://secunia.com/advisories/23186 Broken Link
http://securitytracker.com/id?1017322 Broken Link Third Party Advisory VDB Entry
http://securitytracker.com/id?1017323 Broken Link Third Party Advisory VDB Entry
http://securitytracker.com/id?1017324 Broken Link Third Party Advisory VDB Entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 Broken Link Patch
http://www.securityfocus.com/bid/21371 Broken Link Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/4793 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sun:java_system_application_server:7.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:8.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:-:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:*:*:*:*:*:*:*

History

09 Feb 2024, 02:34

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-444
CPE cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur1:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:8.1:*:platform:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur3:enterprise:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur1:platform:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur7:platform:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur7:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:8.1:ur1:platform:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:*:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur2:enterprise:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:8.1:*:standard:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur2:platform:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur1:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:8.1:*:enterprise:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur2:standard:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:*:platform:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur3:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur2:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur6:platform:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur1:enterprise:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur6:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:8.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:-:*:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:*:*:*:*:*:*:*
References () http://secunia.com/advisories/23186 - () http://secunia.com/advisories/23186 - Broken Link
References () http://securitytracker.com/id?1017322 - () http://securitytracker.com/id?1017322 - Broken Link, Third Party Advisory, VDB Entry
References () http://securitytracker.com/id?1017323 - () http://securitytracker.com/id?1017323 - Broken Link, Third Party Advisory, VDB Entry
References () http://securitytracker.com/id?1017324 - () http://securitytracker.com/id?1017324 - Broken Link, Third Party Advisory, VDB Entry
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 - Patch () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 - Broken Link, Patch
References () http://www.securityfocus.com/bid/21371 - Patch () http://www.securityfocus.com/bid/21371 - Broken Link, Patch, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2006/4793 - () http://www.vupen.com/english/advisories/2006/4793 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 - Third Party Advisory, VDB Entry

Information

Published : 2006-12-04 11:28

Updated : 2024-02-09 02:34


NVD link : CVE-2006-6276

Mitre link : CVE-2006-6276

CVE.ORG link : CVE-2006-6276


JSON object : View

Products Affected

sun

  • java_system_application_server
  • java_system_web_proxy_server
  • one_application_server
  • java_system_web_server
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')