{"api_version":"1","generated_at":"2026-04-23T02:57:44+00:00","cve":"CVE-2006-2341","urls":{"html":"https://cve.report/CVE-2006-2341","api":"https://cve.report/api/cve/CVE-2006-2341.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-2341","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-2341"},"summary":{"title":"CVE-2006-2341","description":"The HTTP proxy in Symantec Gateway Security 5000 Series 2.0.1 and 3.0, and Enterprise Firewall 8.0, when NAT is being used, allows remote attackers to determine internal IP addresses by using malformed HTTP requests, as demonstrated using a get request without a space separating the URI.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2006-05-12 01:02:00","updated_at":"2018-10-18 16:39:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"http://securitytracker.com/id?1016057","name":"1016057","refsource":"SECTRACK","tags":["Patch"],"title":"SecurityTracker.com Archives - Symantec Enterprise Firewall HTTP Proxy May Disclose Internal NAT Addresses","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/17936","name":"17936","refsource":"BID","tags":["Exploit"],"title":"Symantec Enterprise Firewall / Gateway Security HTTP Proxy Internal IP Leakage Weakness","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://securityresponse.symantec.com/avcenter/security/Content/2006.05.10.html","name":"http://securityresponse.symantec.com/avcenter/security/Content/2006.05.10.html","refsource":"CONFIRM","tags":["Patch","Vendor Advisory"],"title":"Symantec Enterprise Firewall NAT/HTTP Proxy internal IP leakage","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26370","name":"symantec-firewall-proxy-ip-disclosure(26370)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/433876/30/5040/threaded","name":"20060512 SEC Consult SA-20060512-0 :: Symantec Enterprise Firewall NAT/HTTP Proxy Private IP Exposure","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20082","name":"20082","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"Symantec Firewall Products Internal IP Addresses Disclosure - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016058","name":"1016058","refsource":"SECTRACK","tags":["Patch"],"title":"SecurityTracker.com Archives - Symantec Gateway Security HTTP Proxy May Disclose Internal NAT Addresses","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1764","name":"ADV-2006-1764","refsource":"VUPEN","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-2341","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2341","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"2341","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"enterprise_firewall","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2341","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"enterprise_firewall","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2341","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"gateway_security","cpe6":"2.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2341","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"gateway_security","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2341","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"gateway_security","cpe6":"5000_series_2.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2341","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"gateway_security","cpe6":"5000_series_3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2341","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"gateway_security","cpe6":"2.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2341","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"gateway_security","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2341","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"gateway_security","cpe6":"5000_series_2.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2341","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"gateway_security","cpe6":"5000_series_3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-2341","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The HTTP proxy in Symantec Gateway Security 5000 Series 2.0.1 and 3.0, and Enterprise Firewall 8.0, when NAT is being used, allows remote attackers to determine internal IP addresses by using malformed HTTP requests, as demonstrated using a get request without a space separating the URI."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://securityresponse.symantec.com/avcenter/security/Content/2006.05.10.html","refsource":"CONFIRM","url":"http://securityresponse.symantec.com/avcenter/security/Content/2006.05.10.html"},{"name":"symantec-firewall-proxy-ip-disclosure(26370)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26370"},{"name":"17936","refsource":"BID","url":"http://www.securityfocus.com/bid/17936"},{"name":"ADV-2006-1764","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1764"},{"name":"1016057","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016057"},{"name":"1016058","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016058"},{"name":"20082","refsource":"SECUNIA","url":"http://secunia.com/advisories/20082"},{"name":"20060512 SEC Consult SA-20060512-0 :: Symantec Enterprise Firewall NAT/HTTP Proxy Private IP Exposure","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/433876/30/5040/threaded"}]}},"nvd":{"publishedDate":"2006-05-12 01:02:00","lastModifiedDate":"2018-10-18 16:39:00","problem_types":["CWE-200"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:symantec:enterprise_firewall:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:symantec:gateway_security:2.0.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:symantec:gateway_security:3.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:h:symantec:gateway_security:5000_series_2.0.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:h:symantec:gateway_security:5000_series_3.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"2341","Ordinal":"17648","Title":"CVE-2006-2341","CVE":"CVE-2006-2341","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"2341","Ordinal":"1","NoteData":"The HTTP proxy in Symantec Gateway Security 5000 Series 2.0.1 and 3.0, and Enterprise Firewall 8.0, when NAT is being used, allows remote attackers to determine internal IP addresses by using malformed HTTP requests, as demonstrated using a get request without a space separating the URI.","Type":"Description","Title":null},{"CveYear":"2006","CveId":"2341","Ordinal":"2","NoteData":"2006-05-11","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"2341","Ordinal":"3","NoteData":"2018-10-18","Type":"Other","Title":"Modified"}]}}}