{"api_version":"1","generated_at":"2026-05-13T11:01:22+00:00","cve":"CVE-2006-0254","urls":{"html":"https://cve.report/CVE-2006-0254","api":"https://cve.report/api/cve/CVE-2006-0254.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-0254","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-0254"},"summary":{"title":"CVE-2006-0254","description":"Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer.","state":"PUBLISHED","assigner":"mitre","published_at":"2006-01-18 01:51:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"4.3","severity":"","vector":"AV:N/AC:M/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"http://secunia.com/advisories/31493","name":"http://secunia.com/advisories/31493","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat update for Red Hat Network Satellite Server - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html","name":"http://www.redhat.com/support/errata/RHSA-2008-0261.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/0217","name":"http://www.vupen.com/english/advisories/2006/0217","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18485","name":"http://secunia.com/advisories/18485","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Apache Geronimo Web-Access-Log Viewer Script Insertion - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/421996/100/0/threaded","name":"http://www.securityfocus.com/archive/1/421996/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181&styleName=Html&projectId=10220&Create=Create","name":"https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181&styleName=Html&projectId=10220&Create=Create","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Release Notes - ASF JIRA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24159","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24159","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24158","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24158","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oliverkarow.de/research/geronimo_css.txt","name":"http://www.oliverkarow.de/research/geronimo_css.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://issues.apache.org/jira/browse/GERONIMO-1474","name":"http://issues.apache.org/jira/browse/GERONIMO-1474","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"],"title":"[GERONIMO-1474] Cross site scripting vulnerabilites - ASF JIRA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html","name":"http://rhn.redhat.com/errata/RHSA-2008-0630.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"access.redhat.com","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/16260","name":"http://www.securityfocus.com/bid/16260","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"Apache Geronimo Multiple Input Validation Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-0254","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-0254","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"254","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"geronimo","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T16:25:34.111Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"RHSA-2008:0630","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html"},{"name":"31493","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31493"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.oliverkarow.de/research/geronimo_css.txt"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181&styleName=Html&projectId=10220&Create=Create"},{"name":"16260","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/16260"},{"name":"ADV-2006-0217","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/0217"},{"name":"geronimo-webaccesslog-viewer-xss(24159)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24159"},{"name":"geronimo-jspexamples-xss(24158)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24158"},{"name":"20060115 Apache Geronimo 1.0 - CSS and persistent HTML-Injectionvulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/421996/100/0/threaded"},{"name":"RHSA-2008:0261","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://issues.apache.org/jira/browse/GERONIMO-1474"},{"name":"18485","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18485"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-01-15T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-19T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"RHSA-2008:0630","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html"},{"name":"31493","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31493"},{"tags":["x_refsource_MISC"],"url":"http://www.oliverkarow.de/research/geronimo_css.txt"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181&styleName=Html&projectId=10220&Create=Create"},{"name":"16260","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/16260"},{"name":"ADV-2006-0217","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/0217"},{"name":"geronimo-webaccesslog-viewer-xss(24159)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24159"},{"name":"geronimo-jspexamples-xss(24158)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24158"},{"name":"20060115 Apache Geronimo 1.0 - CSS and persistent HTML-Injectionvulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/421996/100/0/threaded"},{"name":"RHSA-2008:0261","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html"},{"tags":["x_refsource_MISC"],"url":"http://issues.apache.org/jira/browse/GERONIMO-1474"},{"name":"18485","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18485"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-0254","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"RHSA-2008:0630","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html"},{"name":"31493","refsource":"SECUNIA","url":"http://secunia.com/advisories/31493"},{"name":"http://www.oliverkarow.de/research/geronimo_css.txt","refsource":"MISC","url":"http://www.oliverkarow.de/research/geronimo_css.txt"},{"name":"https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181&styleName=Html&projectId=10220&Create=Create","refsource":"CONFIRM","url":"https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181&styleName=Html&projectId=10220&Create=Create"},{"name":"16260","refsource":"BID","url":"http://www.securityfocus.com/bid/16260"},{"name":"ADV-2006-0217","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/0217"},{"name":"geronimo-webaccesslog-viewer-xss(24159)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24159"},{"name":"geronimo-jspexamples-xss(24158)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24158"},{"name":"20060115 Apache Geronimo 1.0 - CSS and persistent HTML-Injectionvulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/421996/100/0/threaded"},{"name":"RHSA-2008:0261","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html"},{"name":"http://issues.apache.org/jira/browse/GERONIMO-1474","refsource":"MISC","url":"http://issues.apache.org/jira/browse/GERONIMO-1474"},{"name":"18485","refsource":"SECUNIA","url":"http://secunia.com/advisories/18485"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-0254","datePublished":"2006-01-18T02:00:00.000Z","dateReserved":"2006-01-18T00:00:00.000Z","dateUpdated":"2024-08-07T16:25:34.111Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-01-18 01:51:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:geronimo:1.0:*:*:*:*:*:*:*","matchCriteriaId":"CCEA65AC-5A1B-4354-AB6C-E1525B060581"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"254","Ordinal":"1","Title":"CVE-2006-0254","CVE":"CVE-2006-0254","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"254","Ordinal":"1","NoteData":"Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer.","Type":"Description","Title":"CVE-2006-0254"},{"CveYear":"2006","CveId":"254","Ordinal":"2","NoteData":"2006-01-17","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"254","Ordinal":"3","NoteData":"2018-10-19","Type":"Other","Title":"Modified"}]}}}