CVE-2006-2431
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
17/05/2006
Last modified:
03/04/2025
Description
Cross-site scripting (XSS) vulnerability in the 500 Internal Server Error page on the SOAP port (8880/tcp) in IBM WebSphere Application Server 5.0.2 and earlier, 5.1.x before 5.1.1.12, and 6.0.2 up to 6.0.2.7, allows remote attackers to inject arbitrary web script or HTML via the URI, which is contained in a FAULTACTOR element on this page. NOTE: some sources have reported the element as "faultfactor," but this is likely erroneous.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:ibm:websphere_application_server:5.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.1.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.1.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2006-05/0175.html
- http://secunia.com/advisories/20032
- http://securityreason.com/securityalert/910
- http://securitytracker.com/id?1017170=
- http://www-1.ibm.com/support/docview.wss?rs=0&dc=DB550&q1=PK16492&uid=swg1PK22416&loc=en_US&cs=utf-8&lang=
- http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012064
- http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012163
- http://www-1.ibm.com/support/search.wss?rs=0&q=PK16602&apar=only
- http://www-1.ibm.com/support/search.wss?rs=0&q=PK26181&apar=only
- http://www.attrition.org/pipermail/vim/2006-November/001112.html
- http://www.niscc.gov.uk/niscc/docs/re-20061031-00727.pdf?lang=en
- http://www.osvdb.org/25371
- http://www.securityfocus.com/archive/1/450704/100/0/threaded
- http://www.securityfocus.com/bid/21018
- http://www.vupen.com/english/advisories/2006/1736
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30055
- http://archives.neohapsis.com/archives/bugtraq/2006-05/0175.html
- http://secunia.com/advisories/20032
- http://securityreason.com/securityalert/910
- http://securitytracker.com/id?1017170=
- http://www-1.ibm.com/support/docview.wss?rs=0&dc=DB550&q1=PK16492&uid=swg1PK22416&loc=en_US&cs=utf-8&lang=
- http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012064
- http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012163
- http://www-1.ibm.com/support/search.wss?rs=0&q=PK16602&apar=only
- http://www-1.ibm.com/support/search.wss?rs=0&q=PK26181&apar=only
- http://www.attrition.org/pipermail/vim/2006-November/001112.html
- http://www.niscc.gov.uk/niscc/docs/re-20061031-00727.pdf?lang=en
- http://www.osvdb.org/25371
- http://www.securityfocus.com/archive/1/450704/100/0/threaded
- http://www.securityfocus.com/bid/21018
- http://www.vupen.com/english/advisories/2006/1736
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30055