Search for vulnerabilities
Vulnerability details: VCID-beah-u8vc-aaaq
Vulnerability ID VCID-beah-u8vc-aaaq
Aliases CVE-2006-3918
Summary http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual MODERATE http://marc.info/?l=bugtraq&m=130497311408250&w=2
rhas Important https://access.redhat.com/errata/RHSA-2006:0618
rhas Moderate https://access.redhat.com/errata/RHSA-2006:0619
rhas Important https://access.redhat.com/errata/RHSA-2006:0692
rhas Low https://access.redhat.com/errata/RHSA-2008:0523
rhas Moderate https://access.redhat.com/errata/RHSA-2010:0602
epss 0.85585 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.8573 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.86757 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.86757 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.86757 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.86757 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.86757 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91582 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91582 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91582 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91582 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91582 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91582 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91582 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91582 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91582 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91582 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91833 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91833 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91833 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91833 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91833 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91833 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91833 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.91833 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.95235 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.95235 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.97122 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.97122 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.97122 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
epss 0.97122 https://api.first.org/data/v1/epss?cve=CVE-2006-3918
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=200732
apache_httpd moderate https://httpd.apache.org/security/json/CVE-2006-3918.json
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2006-3918
Reference id Reference type URL
ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P
http://archives.neohapsis.com/archives/bugtraq/2006-05/0151.html
http://archives.neohapsis.com/archives/bugtraq/2006-07/0425.html
http://kb.vmware.com/KanisaPlatform/Publishing/466/5915871_f.SAL_Public.html
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html
http://marc.info/?l=bugtraq&m=125631037611762&w=2
http://marc.info/?l=bugtraq&m=129190899612998&w=2
http://marc.info/?l=bugtraq&m=130497311408250&w=2
http://openbsd.org/errata.html#httpd2
http://rhn.redhat.com/errata/RHSA-2006-0618.html
http://rhn.redhat.com/errata/RHSA-2006-0692.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3918.json
https://api.first.org/data/v1/epss?cve=CVE-2006-3918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918
http://secunia.com/advisories/21172
http://secunia.com/advisories/21174
http://secunia.com/advisories/21399
http://secunia.com/advisories/21478
http://secunia.com/advisories/21598
http://secunia.com/advisories/21744
http://secunia.com/advisories/21848
http://secunia.com/advisories/21986
http://secunia.com/advisories/22140
http://secunia.com/advisories/22317
http://secunia.com/advisories/22523
http://secunia.com/advisories/28749
http://secunia.com/advisories/29640
http://secunia.com/advisories/40256
http://securityreason.com/securityalert/1294
http://securitytracker.com/id?1016569
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10352
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12238
http://support.avaya.com/elmodocs2/security/ASA-2006-194.htm
http://svn.apache.org/viewvc?view=rev&revision=394965
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631
http://www-1.ibm.com/support/docview.wss?uid=swg24013080
http://www.debian.org/security/2006/dsa-1167
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-2.html
http://www.novell.com/linux/security/advisories/2006_51_apache.html
http://www.redhat.com/support/errata/RHSA-2006-0619.html
http://www.securityfocus.com/bid/19661
http://www.securitytracker.com/id?1024144
http://www.ubuntu.com/usn/usn-575-1
http://www.vupen.com/english/advisories/2006/2963
http://www.vupen.com/english/advisories/2006/2964
http://www.vupen.com/english/advisories/2006/3264
http://www.vupen.com/english/advisories/2006/4207
http://www.vupen.com/english/advisories/2006/5089
http://www.vupen.com/english/advisories/2010/1572
200732 https://bugzilla.redhat.com/show_bug.cgi?id=200732
381376 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=381376
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.11:*:win32:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.11:*:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.12:*:win32:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.12:*:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:http_server:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:http_server:6.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:http_server:6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:http_server:6.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:2.0:*:*:*:*:*:*:*
CVE-2006-3918 https://httpd.apache.org/security/json/CVE-2006-3918.json
CVE-2006-3918 https://nvd.nist.gov/vuln/detail/CVE-2006-3918
CVE-2006-3918;OSVDB-27488 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/28424.txt
CVE-2006-3918;OSVDB-27488 Exploit https://www.securityfocus.com/bid/19661/info
RHSA-2006:0618 https://access.redhat.com/errata/RHSA-2006:0618
RHSA-2006:0619 https://access.redhat.com/errata/RHSA-2006:0619
RHSA-2006:0692 https://access.redhat.com/errata/RHSA-2006:0692
RHSA-2008:0523 https://access.redhat.com/errata/RHSA-2008:0523
RHSA-2010:0602 https://access.redhat.com/errata/RHSA-2010:0602
USN-575-1 https://usn.ubuntu.com/575-1/
Data source Exploit-DB
Date added Aug. 24, 2006
Description Apache 1.3.35/2.0.58/2.2.2 - Arbitrary HTTP Request Headers Security
Ransomware campaign use Known
Source publication date Aug. 24, 2006
Exploit type remote
Platform linux
Source update date Sept. 21, 2013
Source URL https://www.securityfocus.com/bid/19661/info
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2006-3918
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.99218
EPSS Score 0.85585
Published At March 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.