First published: Fri Jul 28 2006(Updated: )
http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server | >=1.3.3<1.3.35 | |
Debian | =3.1 | |
Ubuntu | =6.06 | |
Ubuntu | =6.10 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Red Hat Enterprise Linux Server | =2.0 | |
Red Hat Enterprise Linux Workstation | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3918 allows attackers to exploit the Expect header vulnerability, potentially leading to cross-site scripting attacks.
To mitigate CVE-2006-3918, update your Apache HTTP Server to versions 1.3.35 or later, or 2.0.58 and later.
CVE-2006-3918 affects IBM HTTP Server 6.0 before 6.0.2.13, Apache HTTP Server 1.3 before 1.3.35, and other versions prior to their secure releases.
Yes, CVE-2006-3918 is considered a serious vulnerability due to its potential for enabling cross-site scripting attacks.
If you cannot update, you should implement proper filtering and sanitization of the Expect header to reduce the risk associated with CVE-2006-3918.