CVE-2006-2431
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-79
Neutralización incorrecta de la entrada durante la generación de la página web (Cross-site Scripting)
Fecha de publicación:
17/05/2006
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Cross-site scripting (XSS) vulnerability in the 500 Internal Server Error page on the SOAP port (8880/tcp) in IBM WebSphere Application Server 5.0.2 and earlier, 5.1.x before 5.1.1.12, and 6.0.2 up to 6.0.2.7, allows remote attackers to inject arbitrary web script or HTML via the URI, which is contained in a FAULTACTOR element on this page. NOTE: some sources have reported the element as "faultfactor," but this is likely erroneous.
Impacto
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:ibm:websphere_application_server:5.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.1.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:5.1.1.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://archives.neohapsis.com/archives/bugtraq/2006-05/0175.html
- http://secunia.com/advisories/20032
- http://securityreason.com/securityalert/910
- http://securitytracker.com/id?1017170=
- http://www-1.ibm.com/support/docview.wss?rs=0&dc=DB550&q1=PK16492&uid=swg1PK22416&loc=en_US&cs=utf-8&lang=
- http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012064
- http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012163
- http://www-1.ibm.com/support/search.wss?rs=0&q=PK16602&apar=only
- http://www-1.ibm.com/support/search.wss?rs=0&q=PK26181&apar=only
- http://www.attrition.org/pipermail/vim/2006-November/001112.html
- http://www.niscc.gov.uk/niscc/docs/re-20061031-00727.pdf?lang=en
- http://www.osvdb.org/25371
- http://www.securityfocus.com/archive/1/450704/100/0/threaded
- http://www.securityfocus.com/bid/21018
- http://www.vupen.com/english/advisories/2006/1736
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30055
- http://archives.neohapsis.com/archives/bugtraq/2006-05/0175.html
- http://secunia.com/advisories/20032
- http://securityreason.com/securityalert/910
- http://securitytracker.com/id?1017170=
- http://www-1.ibm.com/support/docview.wss?rs=0&dc=DB550&q1=PK16492&uid=swg1PK22416&loc=en_US&cs=utf-8&lang=
- http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012064
- http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012163
- http://www-1.ibm.com/support/search.wss?rs=0&q=PK16602&apar=only
- http://www-1.ibm.com/support/search.wss?rs=0&q=PK26181&apar=only
- http://www.attrition.org/pipermail/vim/2006-November/001112.html
- http://www.niscc.gov.uk/niscc/docs/re-20061031-00727.pdf?lang=en
- http://www.osvdb.org/25371
- http://www.securityfocus.com/archive/1/450704/100/0/threaded
- http://www.securityfocus.com/bid/21018
- http://www.vupen.com/english/advisories/2006/1736
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30055