First published: Tue Oct 10 2006(Updated: )
The XMLHTTP ActiveX control in Microsoft XML Parser 2.6 and XML Core Services 3.0 through 6.0 does not properly handle HTTP server-side redirects, which allows remote user-assisted attackers to access content from other domains.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft XML Core Services | =3.0 | |
Microsoft XML Core Services | =4.0 | |
Microsoft XML Core Services | =6.0 | |
MSXML SP3 Parser | =2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4685 has a medium severity rating due to its potential impact on user data security if exploited.
To fix CVE-2006-4685, upgrade to the latest version of Microsoft XML Core Services or Microsoft XML Parser that has addressed this vulnerability.
CVE-2006-4685 affects systems running Microsoft XML Parser 2.6 and Microsoft XML Core Services versions 3.0, 4.0, and 6.0.
By exploiting CVE-2006-4685, attackers can gain unauthorized access to content from other domains by leveraging HTTP server-side redirects.
While CVE-2006-4685 was identified many years ago, its relevance persists for legacy systems that still use the affected software versions.