4.3

CVE-2006-3918

Exploit

http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.

Data is provided by the National Vulnerability Database (NVD)
ApacheHTTP Server Version >= 1.3.3 < 1.3.35
DebianDebian Linux Version3.1
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version6.10
CanonicalUbuntu Linux Version7.04
CanonicalUbuntu Linux Version7.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 91.37% 0.996
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

http://marc.info/?l=bugtraq&m=130497311408250&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=125631037611762&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=129190899612998&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://secunia.com/advisories/21172
Patch
Vendor Advisory
Not Applicable
http://secunia.com/advisories/21174
Patch
Vendor Advisory
Not Applicable
http://securityreason.com/securityalert/1294
Third Party Advisory
Exploit
http://securitytracker.com/id?1016569
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/bid/19661
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1024144
Third Party Advisory
Broken Link
VDB Entry