CVE-2006-6679
7.5
CVSS Score
High
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Link copied!
Description
Pedro Lineu Orso chetcpasswd before 2.4 relies on the X-Forwarded-For HTTP header when verifying a client's status on an IP address ACL, which allows remote attackers to gain unauthorized access by spoofing this header.
CVSS Vector Details
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Affected Software Configurations
- a chetcpasswd_project chetcpasswd * * * * * * * *
Weaknesses (CWE)
- CWE-863
References & External Links
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454
- http://marc.info/?l=bugtraq&m=116371297325564&w=2
- http://secunia.com/advisories/22967
- http://sourceforge.net/project/shownotes.php?group_id=68912&release_id=466649
- http://www.osvdb.org/30544
- http://www.securityfocus.com/bid/21102
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30451
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454
- http://marc.info/?l=bugtraq&m=116371297325564&w=2
- http://secunia.com/advisories/22967
- http://sourceforge.net/project/shownotes.php?group_id=68912&release_id=466649
- http://www.osvdb.org/30544
- http://www.securityfocus.com/bid/21102
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30451
External Resources
CVE History Timeline
Dec 21, 2006 21:17
Initial Analysis
Oct 18, 2016 03:42
CVE Modified
Nov 18, 2016 19:31
Modified Analysis
Jul 29, 2017 01:29
CVE Modified
Jan 25, 2024 02:20
Modified Analysis
May 14, 2024 01:41
CVE Modified
Nov 21, 2024 00:23
CVE Modified