CVE-2006-7192

Current Description

Microsoft ASP .NET Framework 2.0.50727.42 does not properly handle comment (/* */) enclosures, which allows remote attackers to bypass request filtering and conduct cross-site scripting (XSS) attacks, or cause a denial of service, as demonstrated via an xss:expression STYLE attribute in a closing XSS HTML tag.

Basic Data

PublishedApril 10, 2007
Last ModifiedOctober 16, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationMicrosoft.net Framework2.0*******

Vulnerable Software List

VendorProductVersions
Microsoft .net Framework 2.0

References

NameSourceURLTags
35269http://osvdb.org/35269OSVDB
2530http://securityreason.com/securityalert/2530SREASON
http://www.cpni.gov.uk/docs/re-20061020-00710.pdfhttp://www.cpni.gov.uk/docs/re-20061020-00710.pdfMISC
http://www.procheckup.com/Vulner_PR0703.phphttp://www.procheckup.com/Vulner_PR0703.phpMISCPATCH Vendor Advisory
20070405 Microsoft .NET request filtering bypass vulnerability (BID 20753)http://www.securityfocus.com/archive/1/464796/100/0/threadedBUGTRAQ
20753http://www.securityfocus.com/bid/20753BID