CVE-2006-6104
Mono XSP 1.x/2.0 - Source Code Information Disclosure
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
4
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The System.Web class in the XSP for ASP.NET server 1.1 through 2.0 in Mono does not properly verify local pathnames, which allows remote attackers to (1) read source code by appending a space (%20) to a URI, and (2) read credentials via a request for Web.Config%20.
La clase System.Web del XSP para el servidor ASP.NET desde la versión 1.1 hasta la 2.0 en Mono no verifica apropiadamente los nombres de rutas locales, lo cual permite a atacantes remotos (1)leer el código fuente añadiendo un espacio (%20) a la URI y (2) leer las credenciales mediante una petición al Web.Config%20.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2006-11-24 CVE Reserved
- 2006-12-20 First Exploit
- 2006-12-21 CVE Published
- 2024-08-07 CVE Updated
- 2024-11-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (21)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/23597 | Third Party Advisory | |
http://secunia.com/advisories/23727 | Third Party Advisory | |
http://secunia.com/advisories/23776 | Third Party Advisory | |
http://secunia.com/advisories/23779 | Third Party Advisory | |
http://securityreason.com/securityalert/2082 | Third Party Advisory | |
http://securitytracker.com/id?1017430 | Vdb Entry | |
http://www.securityfocus.com/archive/1/454962/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2006/5099 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2092 | Signature |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/29302 | 2006-12-20 | |
http://secunia.com/advisories/23432 | 2024-08-07 | |
http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html | 2024-08-07 | |
http://www.securityfocus.com/bid/21687 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/23435 | 2018-10-17 | |
http://secunia.com/advisories/23462 | 2018-10-17 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:234 | 2018-10-17 | |
http://www.ubuntu.com/usn/usn-397-1 | 2018-10-17 |
URL | Date | SRC |
---|---|---|
http://fedoranews.org/cms/node/2400 | 2018-10-17 | |
http://fedoranews.org/cms/node/2401 | 2018-10-17 | |
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0002.html | 2018-10-17 | |
http://security.gentoo.org/glsa/glsa-200701-12.xml | 2018-10-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mono Search vendor "Mono" | Xsp Search vendor "Mono" for product "Xsp" | 1.1 Search vendor "Mono" for product "Xsp" and version "1.1" | - |
Affected
| ||||||
Mono Search vendor "Mono" | Xsp Search vendor "Mono" for product "Xsp" | 1.2.1 Search vendor "Mono" for product "Xsp" and version "1.2.1" | - |
Affected
| ||||||
Mono Search vendor "Mono" | Xsp Search vendor "Mono" for product "Xsp" | 2.0 Search vendor "Mono" for product "Xsp" and version "2.0" | - |
Affected
|