CVE-2006-6104

The System.Web class in the XSP for ASP.NET server 1.1 through 2.0 in Mono does not properly verify local pathnames, which allows remote attackers to (1) read source code by appending a space (%20) to a URI, and (2) read credentials via a request for Web.Config%20.
References
Link Resource
http://fedoranews.org/cms/node/2400
http://fedoranews.org/cms/node/2401
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0002.html
http://secunia.com/advisories/23432 Exploit Patch Vendor Advisory
http://secunia.com/advisories/23435 Patch Vendor Advisory
http://secunia.com/advisories/23462 Patch Vendor Advisory
http://secunia.com/advisories/23597
http://secunia.com/advisories/23727
http://secunia.com/advisories/23776
http://secunia.com/advisories/23779
http://security.gentoo.org/glsa/glsa-200701-12.xml
http://securityreason.com/securityalert/2082
http://securitytracker.com/id?1017430
http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html Exploit
http://www.mandriva.com/security/advisories?name=MDKSA-2006:234 Patch Vendor Advisory
http://www.securityfocus.com/archive/1/454962/100/0/threaded
http://www.securityfocus.com/bid/21687 Exploit Patch
http://www.ubuntu.com/usn/usn-397-1 Patch
http://www.vupen.com/english/advisories/2006/5099
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2092
http://fedoranews.org/cms/node/2400
http://fedoranews.org/cms/node/2401
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0002.html
http://secunia.com/advisories/23432 Exploit Patch Vendor Advisory
http://secunia.com/advisories/23435 Patch Vendor Advisory
http://secunia.com/advisories/23462 Patch Vendor Advisory
http://secunia.com/advisories/23597
http://secunia.com/advisories/23727
http://secunia.com/advisories/23776
http://secunia.com/advisories/23779
http://security.gentoo.org/glsa/glsa-200701-12.xml
http://securityreason.com/securityalert/2082
http://securitytracker.com/id?1017430
http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html Exploit
http://www.mandriva.com/security/advisories?name=MDKSA-2006:234 Patch Vendor Advisory
http://www.securityfocus.com/archive/1/454962/100/0/threaded
http://www.securityfocus.com/bid/21687 Exploit Patch
http://www.ubuntu.com/usn/usn-397-1 Patch
http://www.vupen.com/english/advisories/2006/5099
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2092
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mono:xsp:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mono:xsp:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mono:xsp:2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:21

Type Values Removed Values Added
References () http://fedoranews.org/cms/node/2400 - () http://fedoranews.org/cms/node/2400 -
References () http://fedoranews.org/cms/node/2401 - () http://fedoranews.org/cms/node/2401 -
References () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0002.html - () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0002.html -
References () http://secunia.com/advisories/23432 - Exploit, Patch, Vendor Advisory () http://secunia.com/advisories/23432 - Exploit, Patch, Vendor Advisory
References () http://secunia.com/advisories/23435 - Patch, Vendor Advisory () http://secunia.com/advisories/23435 - Patch, Vendor Advisory
References () http://secunia.com/advisories/23462 - Patch, Vendor Advisory () http://secunia.com/advisories/23462 - Patch, Vendor Advisory
References () http://secunia.com/advisories/23597 - () http://secunia.com/advisories/23597 -
References () http://secunia.com/advisories/23727 - () http://secunia.com/advisories/23727 -
References () http://secunia.com/advisories/23776 - () http://secunia.com/advisories/23776 -
References () http://secunia.com/advisories/23779 - () http://secunia.com/advisories/23779 -
References () http://security.gentoo.org/glsa/glsa-200701-12.xml - () http://security.gentoo.org/glsa/glsa-200701-12.xml -
References () http://securityreason.com/securityalert/2082 - () http://securityreason.com/securityalert/2082 -
References () http://securitytracker.com/id?1017430 - () http://securitytracker.com/id?1017430 -
References () http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html - Exploit () http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html - Exploit
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:234 - Patch, Vendor Advisory () http://www.mandriva.com/security/advisories?name=MDKSA-2006:234 - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/454962/100/0/threaded - () http://www.securityfocus.com/archive/1/454962/100/0/threaded -
References () http://www.securityfocus.com/bid/21687 - Exploit, Patch () http://www.securityfocus.com/bid/21687 - Exploit, Patch
References () http://www.ubuntu.com/usn/usn-397-1 - Patch () http://www.ubuntu.com/usn/usn-397-1 - Patch
References () http://www.vupen.com/english/advisories/2006/5099 - () http://www.vupen.com/english/advisories/2006/5099 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2092 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2092 -

Information

Published : 2006-12-21 19:28

Updated : 2024-11-21 00:21


NVD link : CVE-2006-6104

Mitre link : CVE-2006-6104

CVE.ORG link : CVE-2006-6104


JSON object : View

Products Affected

mono

  • xsp