HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/23186 - Broken Link | |
References | () http://securitytracker.com/id?1017322 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://securitytracker.com/id?1017323 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://securitytracker.com/id?1017324 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 - Broken Link, Patch | |
References | () http://www.securityfocus.com/bid/21371 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2006/4793 - Broken Link | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 - Third Party Advisory, VDB Entry |
09 Feb 2024, 02:34
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:* cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:* cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:* cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:* cpe:2.3:a:sun:java_system_application_server:8.1:*:enterprise:*:*:*:*:* cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:* cpe:2.3:a:sun:one_application_server:7.0:ur1:platform:*:*:*:*:* cpe:2.3:a:sun:one_application_server:7.0:ur6:platform:*:*:*:*:* cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:* cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:* cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:* cpe:2.3:a:sun:java_system_application_server:8.1:ur1:platform:*:*:*:*:* cpe:2.3:a:sun:java_system_application_server:7.0:ur2:enterprise:*:*:*:*:* cpe:2.3:a:sun:one_application_server:7.0:*:platform:*:*:*:*:* cpe:2.3:a:sun:java_system_application_server:7.0:ur1:standard:*:*:*:*:* cpe:2.3:a:sun:java_system_application_server:7.0:ur3:standard:*:*:*:*:* cpe:2.3:a:sun:one_application_server:7.0:ur1:standard:*:*:*:*:* cpe:2.3:a:sun:java_system_application_server:8.1:*:standard:*:*:*:*:* cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:* cpe:2.3:a:sun:one_application_server:7.0:ur2:standard:*:*:*:*:* cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:* cpe:2.3:a:sun:java_system_application_server:7.0:ur3:enterprise:*:*:*:*:* cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:* cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:* cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:* cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:* cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:* cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:* cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:* cpe:2.3:a:sun:one_application_server:7.0:ur2:platform:*:*:*:*:* cpe:2.3:a:sun:one_application_server:7.0:update_3:*:*:*:*:*:* cpe:2.3:a:sun:one_application_server:7.0:ur6:standard:*:*:*:*:* cpe:2.3:a:sun:java_system_application_server:7.0:ur2:standard:*:*:*:*:* cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:* cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:* cpe:2.3:a:sun:one_application_server:7.0:ur7:platform:*:*:*:*:* cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:* cpe:2.3:a:sun:one_application_server:7.0:*:standard:*:*:*:*:* cpe:2.3:a:sun:one_application_server:7.0:ur7:standard:*:*:*:*:* cpe:2.3:a:sun:java_system_application_server:7.0:ur1:enterprise:*:*:*:*:* |
cpe:2.3:a:sun:java_system_web_proxy_server:-:*:*:*:*:*:*:* cpe:2.3:a:sun:java_system_application_server:8.1:*:*:*:*:*:*:* cpe:2.3:a:sun:one_application_server:7.0:*:*:*:*:*:*:* |
CWE | CWE-444 | |
References | (SECTRACK) http://securitytracker.com/id?1017323 - Broken Link, Third Party Advisory, VDB Entry | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 - Third Party Advisory, VDB Entry | |
References | (SECTRACK) http://securitytracker.com/id?1017324 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECTRACK) http://securitytracker.com/id?1017322 - Broken Link, Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/21371 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | (VUPEN) http://www.vupen.com/english/advisories/2006/4793 - Broken Link | |
References | (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 - Broken Link, Patch | |
References | (SECUNIA) http://secunia.com/advisories/23186 - Broken Link |
Information
Published : 2006-12-04 11:28
Updated : 2024-11-21 00:22
NVD link : CVE-2006-6276
Mitre link : CVE-2006-6276
CVE.ORG link : CVE-2006-6276
JSON object : View
Products Affected
sun
- one_application_server
- java_system_web_server
- java_system_application_server
- java_system_web_proxy_server
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')