Search criteria

4 vulnerabilities found for xsp by mono

CVE-2006-6104 (GCVE-0-2006-6104)

Vulnerability from nvd – Published: 2006-12-21 19:00 – Updated: 2024-08-07 20:12
VLAI?
Summary
The System.Web class in the XSP for ASP.NET server 1.1 through 2.0 in Mono does not properly verify local pathnames, which allows remote attackers to (1) read source code by appending a space (%20) to a URI, and (2) read credentials via a request for Web.Config%20.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://security.gentoo.org/glsa/glsa-200701-12.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/23597 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/5099 vdb-entryx_refsource_VUPEN
http://lists.suse.com/archive/suse-security-annou… vendor-advisoryx_refsource_SUSE
http://securityreason.com/securityalert/2082 third-party-advisoryx_refsource_SREASON
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.securityfocus.com/archive/1/454962/100… mailing-listx_refsource_BUGTRAQ
http://securitytracker.com/id?1017430 vdb-entryx_refsource_SECTRACK
http://fedoranews.org/cms/node/2400 vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/23462 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23727 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23779 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://secunia.com/advisories/23776 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/21687 vdb-entryx_refsource_BID
http://www.eazel.es/advisory007-mono-xsp-source-d… x_refsource_MISC
http://secunia.com/advisories/23435 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23432 third-party-advisoryx_refsource_SECUNIA
http://fedoranews.org/cms/node/2401 vendor-advisoryx_refsource_FEDORA
http://www.ubuntu.com/usn/usn-397-1 vendor-advisoryx_refsource_UBUNTU
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:12:31.711Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200701-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200701-12.xml"
          },
          {
            "name": "23597",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23597"
          },
          {
            "name": "ADV-2006-5099",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/5099"
          },
          {
            "name": "SUSE-SA:2007:002",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0002.html"
          },
          {
            "name": "2082",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2082"
          },
          {
            "name": "oval:org.mitre.oval:def:2092",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2092"
          },
          {
            "name": "20061220 Mono XSP ASP.NET Server sourcecode disclosure vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/454962/100/0/threaded"
          },
          {
            "name": "1017430",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017430"
          },
          {
            "name": "FEDORA-2007-067",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/cms/node/2400"
          },
          {
            "name": "23462",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23462"
          },
          {
            "name": "23727",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23727"
          },
          {
            "name": "23779",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23779"
          },
          {
            "name": "MDKSA-2006:234",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:234"
          },
          {
            "name": "23776",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23776"
          },
          {
            "name": "21687",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21687"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html"
          },
          {
            "name": "23435",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23435"
          },
          {
            "name": "23432",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23432"
          },
          {
            "name": "FEDORA-2007-068",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/cms/node/2401"
          },
          {
            "name": "USN-397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-397-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The System.Web class in the XSP for ASP.NET server 1.1 through 2.0 in Mono does not properly verify local pathnames, which allows remote attackers to (1) read source code by appending a space (%20) to a URI, and (2) read credentials via a request for Web.Config%20."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "GLSA-200701-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200701-12.xml"
        },
        {
          "name": "23597",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23597"
        },
        {
          "name": "ADV-2006-5099",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/5099"
        },
        {
          "name": "SUSE-SA:2007:002",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0002.html"
        },
        {
          "name": "2082",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2082"
        },
        {
          "name": "oval:org.mitre.oval:def:2092",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2092"
        },
        {
          "name": "20061220 Mono XSP ASP.NET Server sourcecode disclosure vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/454962/100/0/threaded"
        },
        {
          "name": "1017430",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017430"
        },
        {
          "name": "FEDORA-2007-067",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/cms/node/2400"
        },
        {
          "name": "23462",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23462"
        },
        {
          "name": "23727",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23727"
        },
        {
          "name": "23779",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23779"
        },
        {
          "name": "MDKSA-2006:234",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:234"
        },
        {
          "name": "23776",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23776"
        },
        {
          "name": "21687",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21687"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html"
        },
        {
          "name": "23435",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23435"
        },
        {
          "name": "23432",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23432"
        },
        {
          "name": "FEDORA-2007-068",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/cms/node/2401"
        },
        {
          "name": "USN-397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-397-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2006-6104",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The System.Web class in the XSP for ASP.NET server 1.1 through 2.0 in Mono does not properly verify local pathnames, which allows remote attackers to (1) read source code by appending a space (%20) to a URI, and (2) read credentials via a request for Web.Config%20."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200701-12",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200701-12.xml"
            },
            {
              "name": "23597",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23597"
            },
            {
              "name": "ADV-2006-5099",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/5099"
            },
            {
              "name": "SUSE-SA:2007:002",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0002.html"
            },
            {
              "name": "2082",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2082"
            },
            {
              "name": "oval:org.mitre.oval:def:2092",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2092"
            },
            {
              "name": "20061220 Mono XSP ASP.NET Server sourcecode disclosure vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/454962/100/0/threaded"
            },
            {
              "name": "1017430",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017430"
            },
            {
              "name": "FEDORA-2007-067",
              "refsource": "FEDORA",
              "url": "http://fedoranews.org/cms/node/2400"
            },
            {
              "name": "23462",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23462"
            },
            {
              "name": "23727",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23727"
            },
            {
              "name": "23779",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23779"
            },
            {
              "name": "MDKSA-2006:234",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:234"
            },
            {
              "name": "23776",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23776"
            },
            {
              "name": "21687",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21687"
            },
            {
              "name": "http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html",
              "refsource": "MISC",
              "url": "http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html"
            },
            {
              "name": "23435",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23435"
            },
            {
              "name": "23432",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23432"
            },
            {
              "name": "FEDORA-2007-068",
              "refsource": "FEDORA",
              "url": "http://fedoranews.org/cms/node/2401"
            },
            {
              "name": "USN-397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-397-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2006-6104",
    "datePublished": "2006-12-21T19:00:00",
    "dateReserved": "2006-11-24T00:00:00",
    "dateUpdated": "2024-08-07T20:12:31.711Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-2658 (GCVE-0-2006-2658)

Vulnerability from nvd – Published: 2006-09-12 16:00 – Updated: 2024-08-07 17:58
VLAI?
Summary
Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/21847 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3552 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1016821 vdb-entryx_refsource_SECTRACK
http://lists.suse.com/archive/suse-security-annou… vendor-advisoryx_refsource_SUSE
http://www.securityfocus.com/bid/19929 vdb-entryx_refsource_BID
http://secunia.com/advisories/21840 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:58:51.878Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "21847",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21847"
          },
          {
            "name": "ADV-2006-3552",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3552"
          },
          {
            "name": "1016821",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016821"
          },
          {
            "name": "SUSE-SR:2006:022",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2006-Sep/0005.html"
          },
          {
            "name": "19929",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19929"
          },
          {
            "name": "21840",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21840"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-09-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-09-15T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "21847",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21847"
        },
        {
          "name": "ADV-2006-3552",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3552"
        },
        {
          "name": "1016821",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016821"
        },
        {
          "name": "SUSE-SR:2006:022",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2006-Sep/0005.html"
        },
        {
          "name": "19929",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19929"
        },
        {
          "name": "21840",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21840"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2658",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "21847",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21847"
            },
            {
              "name": "ADV-2006-3552",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3552"
            },
            {
              "name": "1016821",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016821"
            },
            {
              "name": "SUSE-SR:2006:022",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2006-Sep/0005.html"
            },
            {
              "name": "19929",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19929"
            },
            {
              "name": "21840",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21840"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2658",
    "datePublished": "2006-09-12T16:00:00",
    "dateReserved": "2006-05-30T00:00:00",
    "dateUpdated": "2024-08-07T17:58:51.878Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6104 (GCVE-0-2006-6104)

Vulnerability from cvelistv5 – Published: 2006-12-21 19:00 – Updated: 2024-08-07 20:12
VLAI?
Summary
The System.Web class in the XSP for ASP.NET server 1.1 through 2.0 in Mono does not properly verify local pathnames, which allows remote attackers to (1) read source code by appending a space (%20) to a URI, and (2) read credentials via a request for Web.Config%20.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://security.gentoo.org/glsa/glsa-200701-12.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/23597 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/5099 vdb-entryx_refsource_VUPEN
http://lists.suse.com/archive/suse-security-annou… vendor-advisoryx_refsource_SUSE
http://securityreason.com/securityalert/2082 third-party-advisoryx_refsource_SREASON
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.securityfocus.com/archive/1/454962/100… mailing-listx_refsource_BUGTRAQ
http://securitytracker.com/id?1017430 vdb-entryx_refsource_SECTRACK
http://fedoranews.org/cms/node/2400 vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/23462 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23727 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23779 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://secunia.com/advisories/23776 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/21687 vdb-entryx_refsource_BID
http://www.eazel.es/advisory007-mono-xsp-source-d… x_refsource_MISC
http://secunia.com/advisories/23435 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23432 third-party-advisoryx_refsource_SECUNIA
http://fedoranews.org/cms/node/2401 vendor-advisoryx_refsource_FEDORA
http://www.ubuntu.com/usn/usn-397-1 vendor-advisoryx_refsource_UBUNTU
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:12:31.711Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200701-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200701-12.xml"
          },
          {
            "name": "23597",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23597"
          },
          {
            "name": "ADV-2006-5099",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/5099"
          },
          {
            "name": "SUSE-SA:2007:002",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0002.html"
          },
          {
            "name": "2082",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2082"
          },
          {
            "name": "oval:org.mitre.oval:def:2092",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2092"
          },
          {
            "name": "20061220 Mono XSP ASP.NET Server sourcecode disclosure vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/454962/100/0/threaded"
          },
          {
            "name": "1017430",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017430"
          },
          {
            "name": "FEDORA-2007-067",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/cms/node/2400"
          },
          {
            "name": "23462",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23462"
          },
          {
            "name": "23727",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23727"
          },
          {
            "name": "23779",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23779"
          },
          {
            "name": "MDKSA-2006:234",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:234"
          },
          {
            "name": "23776",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23776"
          },
          {
            "name": "21687",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21687"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html"
          },
          {
            "name": "23435",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23435"
          },
          {
            "name": "23432",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23432"
          },
          {
            "name": "FEDORA-2007-068",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/cms/node/2401"
          },
          {
            "name": "USN-397-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-397-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The System.Web class in the XSP for ASP.NET server 1.1 through 2.0 in Mono does not properly verify local pathnames, which allows remote attackers to (1) read source code by appending a space (%20) to a URI, and (2) read credentials via a request for Web.Config%20."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "GLSA-200701-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200701-12.xml"
        },
        {
          "name": "23597",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23597"
        },
        {
          "name": "ADV-2006-5099",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/5099"
        },
        {
          "name": "SUSE-SA:2007:002",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0002.html"
        },
        {
          "name": "2082",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2082"
        },
        {
          "name": "oval:org.mitre.oval:def:2092",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2092"
        },
        {
          "name": "20061220 Mono XSP ASP.NET Server sourcecode disclosure vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/454962/100/0/threaded"
        },
        {
          "name": "1017430",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017430"
        },
        {
          "name": "FEDORA-2007-067",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/cms/node/2400"
        },
        {
          "name": "23462",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23462"
        },
        {
          "name": "23727",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23727"
        },
        {
          "name": "23779",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23779"
        },
        {
          "name": "MDKSA-2006:234",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:234"
        },
        {
          "name": "23776",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23776"
        },
        {
          "name": "21687",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21687"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html"
        },
        {
          "name": "23435",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23435"
        },
        {
          "name": "23432",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23432"
        },
        {
          "name": "FEDORA-2007-068",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/cms/node/2401"
        },
        {
          "name": "USN-397-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-397-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2006-6104",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The System.Web class in the XSP for ASP.NET server 1.1 through 2.0 in Mono does not properly verify local pathnames, which allows remote attackers to (1) read source code by appending a space (%20) to a URI, and (2) read credentials via a request for Web.Config%20."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200701-12",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200701-12.xml"
            },
            {
              "name": "23597",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23597"
            },
            {
              "name": "ADV-2006-5099",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/5099"
            },
            {
              "name": "SUSE-SA:2007:002",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0002.html"
            },
            {
              "name": "2082",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2082"
            },
            {
              "name": "oval:org.mitre.oval:def:2092",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2092"
            },
            {
              "name": "20061220 Mono XSP ASP.NET Server sourcecode disclosure vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/454962/100/0/threaded"
            },
            {
              "name": "1017430",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017430"
            },
            {
              "name": "FEDORA-2007-067",
              "refsource": "FEDORA",
              "url": "http://fedoranews.org/cms/node/2400"
            },
            {
              "name": "23462",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23462"
            },
            {
              "name": "23727",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23727"
            },
            {
              "name": "23779",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23779"
            },
            {
              "name": "MDKSA-2006:234",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:234"
            },
            {
              "name": "23776",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23776"
            },
            {
              "name": "21687",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21687"
            },
            {
              "name": "http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html",
              "refsource": "MISC",
              "url": "http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html"
            },
            {
              "name": "23435",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23435"
            },
            {
              "name": "23432",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23432"
            },
            {
              "name": "FEDORA-2007-068",
              "refsource": "FEDORA",
              "url": "http://fedoranews.org/cms/node/2401"
            },
            {
              "name": "USN-397-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-397-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2006-6104",
    "datePublished": "2006-12-21T19:00:00",
    "dateReserved": "2006-11-24T00:00:00",
    "dateUpdated": "2024-08-07T20:12:31.711Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-2658 (GCVE-0-2006-2658)

Vulnerability from cvelistv5 – Published: 2006-09-12 16:00 – Updated: 2024-08-07 17:58
VLAI?
Summary
Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/21847 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3552 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1016821 vdb-entryx_refsource_SECTRACK
http://lists.suse.com/archive/suse-security-annou… vendor-advisoryx_refsource_SUSE
http://www.securityfocus.com/bid/19929 vdb-entryx_refsource_BID
http://secunia.com/advisories/21840 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:58:51.878Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "21847",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21847"
          },
          {
            "name": "ADV-2006-3552",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3552"
          },
          {
            "name": "1016821",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016821"
          },
          {
            "name": "SUSE-SR:2006:022",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2006-Sep/0005.html"
          },
          {
            "name": "19929",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19929"
          },
          {
            "name": "21840",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21840"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-09-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-09-15T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "21847",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21847"
        },
        {
          "name": "ADV-2006-3552",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3552"
        },
        {
          "name": "1016821",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016821"
        },
        {
          "name": "SUSE-SR:2006:022",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2006-Sep/0005.html"
        },
        {
          "name": "19929",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19929"
        },
        {
          "name": "21840",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21840"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2658",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "21847",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21847"
            },
            {
              "name": "ADV-2006-3552",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3552"
            },
            {
              "name": "1016821",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016821"
            },
            {
              "name": "SUSE-SR:2006:022",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2006-Sep/0005.html"
            },
            {
              "name": "19929",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19929"
            },
            {
              "name": "21840",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21840"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2658",
    "datePublished": "2006-09-12T16:00:00",
    "dateReserved": "2006-05-30T00:00:00",
    "dateUpdated": "2024-08-07T17:58:51.878Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}