Search criteria
3 vulnerabilities found for database_command_center by unicenter
FKIE_CVE-2006-6641
Vulnerability from fkie_nvd - Published: 2006-12-20 00:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| arcserve | brightstor | 11.1 | |
| broadcom | cleverpath_portal | * | |
| cleverpath | aion_bpm | r10 | |
| cleverpath | aion_bpm | r10.1 | |
| cleverpath | aion_bpm | r10.2 | |
| cleverpath | portal | r4.7 | |
| cleverpath | portal | r4.51 | |
| cleverpath | portal | r4.71 | |
| etrust | security_command_center | r1 | |
| etrust | security_command_center | r8 | |
| unicenter | asset_and_portfolio_management | r11 | |
| unicenter | database_command_center | r11.1 | |
| unicenter | database_management_portal | r11 | |
| unicenter | enterprise_job_manager | r1_sp3 | |
| unicenter | management_portal | r2.0 | |
| unicenter | management_portal | r3.1 | |
| unicenter | management_portal | r11.0 | |
| unicenter | workload_control_center | r1_sp4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:arcserve:brightstor:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6825A6CF-F540-4516-8982-E32B22D477DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:broadcom:cleverpath_portal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78D7CC0F-3AAF-40F0-B178-B964AF04BFC7",
"versionEndIncluding": "4.71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cleverpath:aion_bpm:r10:*:*:*:*:*:*:*",
"matchCriteriaId": "1398293A-8C8D-405B-A13B-7202D8A2A12B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cleverpath:aion_bpm:r10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8DC0166-B40B-4FE9-A5FE-4674C184EE68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cleverpath:aion_bpm:r10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "01482330-54BA-40E1-908C-884CF2C0B139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cleverpath:portal:r4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D75B44-E386-4BE7-95F6-23804FBFBC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cleverpath:portal:r4.51:*:*:*:*:*:*:*",
"matchCriteriaId": "FD878559-D8DF-4043-9F78-2780F95D103A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cleverpath:portal:r4.71:*:*:*:*:*:*:*",
"matchCriteriaId": "5046BE4F-2445-4CB1-93F1-5BFFA7AD5578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:etrust:security_command_center:r1:*:*:*:*:*:*:*",
"matchCriteriaId": "DDBDB112-8526-4DD5-BE23-45D1E15FDBED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:etrust:security_command_center:r8:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE3CEFA-F003-408D-A066-39C91E958C75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unicenter:asset_and_portfolio_management:r11:*:*:*:*:*:*:*",
"matchCriteriaId": "6DEA53F1-A4D0-4F12-A0FD-3D726072A063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unicenter:database_command_center:r11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "056B5064-4FB7-4196-A975-E6661F0C589C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unicenter:database_management_portal:r11:*:*:*:*:*:*:*",
"matchCriteriaId": "9B0FDF01-4D34-4F2E-9A8E-7A1EB95BC83D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unicenter:enterprise_job_manager:r1_sp3:*:*:*:*:*:*:*",
"matchCriteriaId": "6E3CFF24-EA58-4B45-8BA7-B6CF02650CAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unicenter:management_portal:r2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84ABEA0B-9388-4942-AC12-40AE37C87D99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unicenter:management_portal:r3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE826A5B-B5D1-46CF-9FA9-81041D9C9187",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unicenter:management_portal:r11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "05619FF7-BB58-434D-8177-16B8D4BC792B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unicenter:workload_control_center:r1_sp4:*:*:*:*:*:*:*",
"matchCriteriaId": "017280EE-8C88-43FC-BA76-A1EEF4607036",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en CA CleverPath Portal anterior a la versi\u00f3n de mantenimiento 4.71.001_179_060830, usado en m\u00faltiples productos incluyendo BrightStor Portal r11.1, CleverPath Aion BPM r10 hasta r10.2, eTrust Security Command Center r1 y r8, y Unicenter, no act\u00faa adecuadamente cuando m\u00faltiples servidores Portal son iniciados al mismo tiempo y comparten el mismo almac\u00e9n de informaci\u00f3n, lo cual puede provocar que un usuario de Portal herede la sesi\u00f3n y credenciales de un usuario que est\u00e1 en otro servidor Portal."
}
],
"id": "CVE-2006-6641",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-12-20T00:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/23426"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1017429"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/30854"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/21681"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/5091"
},
{
"source": "cve@mitre.org",
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/23426"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1017429"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/30854"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/21681"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/5091"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2006-6641 (GCVE-0-2006-6641)
Vulnerability from cvelistv5 – Published: 2006-12-20 00:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:33:59.669Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "21681",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21681"
},
{
"name": "ADV-2006-5091",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/5091"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
},
{
"name": "20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
},
{
"name": "30854",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/30854"
},
{
"name": "1017429",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017429"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
},
{
"name": "23426",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23426"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-12-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "21681",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21681"
},
{
"name": "ADV-2006-5091",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/5091"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
},
{
"name": "20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
},
{
"name": "30854",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/30854"
},
{
"name": "1017429",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017429"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
},
{
"name": "23426",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23426"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6641",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "21681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21681"
},
{
"name": "ADV-2006-5091",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5091"
},
{
"name": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp",
"refsource": "CONFIRM",
"url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
},
{
"name": "20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
},
{
"name": "30854",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/30854"
},
{
"name": "1017429",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017429"
},
{
"name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876",
"refsource": "CONFIRM",
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
},
{
"name": "23426",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23426"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-6641",
"datePublished": "2006-12-20T00:00:00",
"dateReserved": "2006-12-19T00:00:00",
"dateUpdated": "2024-08-07T20:33:59.669Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6641 (GCVE-0-2006-6641)
Vulnerability from nvd – Published: 2006-12-20 00:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:33:59.669Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "21681",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21681"
},
{
"name": "ADV-2006-5091",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/5091"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
},
{
"name": "20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
},
{
"name": "30854",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/30854"
},
{
"name": "1017429",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017429"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
},
{
"name": "23426",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23426"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-12-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "21681",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21681"
},
{
"name": "ADV-2006-5091",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/5091"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
},
{
"name": "20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
},
{
"name": "30854",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/30854"
},
{
"name": "1017429",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017429"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
},
{
"name": "23426",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23426"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6641",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "21681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21681"
},
{
"name": "ADV-2006-5091",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5091"
},
{
"name": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp",
"refsource": "CONFIRM",
"url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
},
{
"name": "20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
},
{
"name": "30854",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/30854"
},
{
"name": "1017429",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017429"
},
{
"name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876",
"refsource": "CONFIRM",
"url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
},
{
"name": "23426",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23426"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-6641",
"datePublished": "2006-12-20T00:00:00",
"dateReserved": "2006-12-19T00:00:00",
"dateUpdated": "2024-08-07T20:33:59.669Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}