Vulnerability Details : CVE-2006-3016
Unspecified vulnerability in session.c in PHP before 5.1.3 has unknown impact and attack vectors, related to "certain characters in session names," including special characters that are frequently associated with CRLF injection, SQL injection, cross-site scripting (XSS), and HTTP response splitting vulnerabilities. NOTE: while the nature of the vulnerability is unspecified, it is likely that this is related to a violation of an expectation by PHP applications that the session name is alphanumeric, as implied in the PHP manual for session_name().
Vulnerability category: Sql InjectionCross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2006-3016
Probability of exploitation activity in the next 30 days: 0.63%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 76 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-3016
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
[email protected] |
References for CVE-2006-3016
- http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm
- http://www.php.net/release_5_1_3.php
- ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
- http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm
- http://www.redhat.com/support/errata/RHSA-2006-0682.html
- http://securitytracker.com/id?1016306
- http://rhn.redhat.com/errata/RHSA-2006-0736.html
- http://www.redhat.com/support/errata/RHSA-2006-0669.html
- http://www.securityfocus.com/archive/1/447866/100/0/threaded
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
- https://issues.rpath.com/browse/RPL-683
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10597
- http://www.ubuntu.com/usn/usn-320-1
-
http://www.securityfocus.com/bid/17843
Exploit;Patch
- http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
Products affected by CVE-2006-3016
- cpe:2.3:a:php_group:php:*:*:*:*:*:*:*:*