CVE-2006-6276

HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors.
References
Link Resource
http://secunia.com/advisories/23186 Broken Link
http://securitytracker.com/id?1017322 Broken Link Third Party Advisory VDB Entry
http://securitytracker.com/id?1017323 Broken Link Third Party Advisory VDB Entry
http://securitytracker.com/id?1017324 Broken Link Third Party Advisory VDB Entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 Broken Link Patch
http://www.securityfocus.com/bid/21371 Broken Link Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/4793 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 Third Party Advisory VDB Entry
http://secunia.com/advisories/23186 Broken Link
http://securitytracker.com/id?1017322 Broken Link Third Party Advisory VDB Entry
http://securitytracker.com/id?1017323 Broken Link Third Party Advisory VDB Entry
http://securitytracker.com/id?1017324 Broken Link Third Party Advisory VDB Entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 Broken Link Patch
http://www.securityfocus.com/bid/21371 Broken Link Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/4793 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sun:java_system_application_server:7.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:8.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:-:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () http://secunia.com/advisories/23186 - Broken Link () http://secunia.com/advisories/23186 - Broken Link
References () http://securitytracker.com/id?1017322 - Broken Link, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1017322 - Broken Link, Third Party Advisory, VDB Entry
References () http://securitytracker.com/id?1017323 - Broken Link, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1017323 - Broken Link, Third Party Advisory, VDB Entry
References () http://securitytracker.com/id?1017324 - Broken Link, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1017324 - Broken Link, Third Party Advisory, VDB Entry
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 - Broken Link, Patch () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 - Broken Link, Patch
References () http://www.securityfocus.com/bid/21371 - Broken Link, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/21371 - Broken Link, Patch, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2006/4793 - Broken Link () http://www.vupen.com/english/advisories/2006/4793 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 - Third Party Advisory, VDB Entry

09 Feb 2024, 02:34

Type Values Removed Values Added
CPE cpe:2.3:a:sun:java_system_application_server:8.1:*:platform:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:8.1:*:enterprise:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur1:platform:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur6:platform:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:8.1:ur1:platform:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur2:enterprise:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:*:platform:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur1:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur3:standard:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur1:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:8.1:*:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur2:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur3:enterprise:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur2:platform:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur6:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur2:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur7:platform:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:*:standard:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:ur7:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur1:enterprise:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_proxy_server:-:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:8.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:7.0:*:*:*:*:*:*:*
CWE NVD-CWE-Other CWE-444
References (SECTRACK) http://securitytracker.com/id?1017323 - (SECTRACK) http://securitytracker.com/id?1017323 - Broken Link, Third Party Advisory, VDB Entry
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 - Third Party Advisory, VDB Entry
References (SECTRACK) http://securitytracker.com/id?1017324 - (SECTRACK) http://securitytracker.com/id?1017324 - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://securitytracker.com/id?1017322 - (SECTRACK) http://securitytracker.com/id?1017322 - Broken Link, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/21371 - Patch (BID) http://www.securityfocus.com/bid/21371 - Broken Link, Patch, Third Party Advisory, VDB Entry
References (VUPEN) http://www.vupen.com/english/advisories/2006/4793 - (VUPEN) http://www.vupen.com/english/advisories/2006/4793 - Broken Link
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 - Patch (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 - Broken Link, Patch
References (SECUNIA) http://secunia.com/advisories/23186 - (SECUNIA) http://secunia.com/advisories/23186 - Broken Link

Information

Published : 2006-12-04 11:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6276

Mitre link : CVE-2006-6276

CVE.ORG link : CVE-2006-6276


JSON object : View

Products Affected

sun

  • one_application_server
  • java_system_web_server
  • java_system_application_server
  • java_system_web_proxy_server
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')