// For flags

CVE-2008-3906

Mono 2.0 - 'System.Web' HTTP Header Injection

Severity Score

6.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

CRLF injection vulnerability in Sys.Web in Mono 2.0 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the query string.

Vulnerabilidad de inyección CRLF en Sys.Web en Mono 2.0 y anteriores, permite a atacantes remotos inyectar cabeceras HTTP de su elección y llevar a cabo ataques de división de respuesta HTTP mediante secuencias CRLF en la cadena de consulta(query).

It was discovered that the XML HMAC signature system did not correctly check certain lengths. If an attacker sent a truncated HMAC, it could bypass authentication, leading to potential privilege escalation. It was discovered that Mono did not properly escape certain attributes in the ASP.net class libraries which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data (such as passwords), within the same domain. This issue only affected Ubuntu 8.04 LTS. It was discovered that Mono did not properly filter CRLF injections in the query string. If a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, steal confidential data (such as passwords), or perform cross-site request forgeries. This issue only affected Ubuntu 8.04 LTS.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-09-04 CVE Reserved
  • 2008-09-04 CVE Published
  • 2014-03-17 First Exploit
  • 2024-08-07 CVE Updated
  • 2025-05-28 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mono
Search vendor "Mono"
Mono
Search vendor "Mono" for product "Mono"
1.0
Search vendor "Mono" for product "Mono" and version "1.0"
-
Affected
Mono
Search vendor "Mono"
Mono
Search vendor "Mono" for product "Mono"
1.0.5
Search vendor "Mono" for product "Mono" and version "1.0.5"
-
Affected
Mono
Search vendor "Mono"
Mono
Search vendor "Mono" for product "Mono"
1.1.4
Search vendor "Mono" for product "Mono" and version "1.1.4"
-
Affected
Mono
Search vendor "Mono"
Mono
Search vendor "Mono" for product "Mono"
1.1.8.3
Search vendor "Mono" for product "Mono" and version "1.1.8.3"
-
Affected
Mono
Search vendor "Mono"
Mono
Search vendor "Mono" for product "Mono"
1.1.13
Search vendor "Mono" for product "Mono" and version "1.1.13"
-
Affected
Mono
Search vendor "Mono"
Mono
Search vendor "Mono" for product "Mono"
1.1.13.4
Search vendor "Mono" for product "Mono" and version "1.1.13.4"
-
Affected
Mono
Search vendor "Mono"
Mono
Search vendor "Mono" for product "Mono"
1.1.13.6
Search vendor "Mono" for product "Mono" and version "1.1.13.6"
-
Affected
Mono
Search vendor "Mono"
Mono
Search vendor "Mono" for product "Mono"
1.1.13.7
Search vendor "Mono" for product "Mono" and version "1.1.13.7"
-
Affected
Mono
Search vendor "Mono"
Mono
Search vendor "Mono" for product "Mono"
1.1.17
Search vendor "Mono" for product "Mono" and version "1.1.17"
-
Affected
Mono
Search vendor "Mono"
Mono
Search vendor "Mono" for product "Mono"
1.1.17.1
Search vendor "Mono" for product "Mono" and version "1.1.17.1"
-
Affected
Mono
Search vendor "Mono"
Mono
Search vendor "Mono" for product "Mono"
1.1.18
Search vendor "Mono" for product "Mono" and version "1.1.18"
-
Affected
Mono
Search vendor "Mono"
Mono
Search vendor "Mono" for product "Mono"
1.2.5.1
Search vendor "Mono" for product "Mono" and version "1.2.5.1"
-
Affected
Mono Project
Search vendor "Mono Project"
Mono
Search vendor "Mono Project" for product "Mono"
<= 2.0
Search vendor "Mono Project" for product "Mono" and version " <= 2.0"
-
Affected
Mono Project
Search vendor "Mono Project"
Mono
Search vendor "Mono Project" for product "Mono"
1.2.1
Search vendor "Mono Project" for product "Mono" and version "1.2.1"
-
Affected
Mono Project
Search vendor "Mono Project"
Mono
Search vendor "Mono Project" for product "Mono"
1.2.2
Search vendor "Mono Project" for product "Mono" and version "1.2.2"
-
Affected
Mono Project
Search vendor "Mono Project"
Mono
Search vendor "Mono Project" for product "Mono"
1.2.3
Search vendor "Mono Project" for product "Mono" and version "1.2.3"
-
Affected
Mono Project
Search vendor "Mono Project"
Mono
Search vendor "Mono Project" for product "Mono"
1.2.4
Search vendor "Mono Project" for product "Mono" and version "1.2.4"
-
Affected
Mono Project
Search vendor "Mono Project"
Mono
Search vendor "Mono Project" for product "Mono"
1.2.5
Search vendor "Mono Project" for product "Mono" and version "1.2.5"
-
Affected
Mono Project
Search vendor "Mono Project"
Mono
Search vendor "Mono Project" for product "Mono"
1.2.6
Search vendor "Mono Project" for product "Mono" and version "1.2.6"
-
Affected
Mono Project
Search vendor "Mono Project"
Mono
Search vendor "Mono Project" for product "Mono"
1.9
Search vendor "Mono Project" for product "Mono" and version "1.9"
-
Affected