{"api_version":"1","generated_at":"2026-04-23T05:58:06+00:00","cve":"CVE-2006-6641","urls":{"html":"https://cve.report/CVE-2006-6641","api":"https://cve.report/api/cve/CVE-2006-6641.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-6641","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-6641"},"summary":{"title":"CVE-2006-6641","description":"Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server.","state":"PUBLISHED","assigner":"mitre","published_at":"2006-12-20 00:28:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.osvdb.org/30854","name":"http://www.osvdb.org/30854","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp","name":"http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"SupportConnect - Important Security Notice for CA CleverPath and Embedded Portal Customers","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/23426","name":"http://secunia.com/advisories/23426","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"CA Portal Technology Session Handling Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/455041/100/0/threaded","name":"http://www.securityfocus.com/archive/1/455041/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876","name":"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"CA CleverPath Portal session verification vulnerability - CA","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://securitytracker.com/id?1017429","name":"http://securitytracker.com/id?1017429","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"CA CleverPath Portal May Let Remote Users Access Portal Sessions of Other Users in Certain Cases - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/21681","name":"http://www.securityfocus.com/bid/21681","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Computer Associates Multiple CleverPath Portal Environments Session Hijacking Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2006/5091","name":"http://www.vupen.com/english/advisories/2006/5091","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-6641","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6641","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"arcserve","cpe5":"brightstor","cpe6":"11.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"4.71","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"cleverpath_portal","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cleverpath","cpe5":"aion_bpm","cpe6":"r10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cleverpath","cpe5":"aion_bpm","cpe6":"r10.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cleverpath","cpe5":"aion_bpm","cpe6":"r10.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cleverpath","cpe5":"portal","cpe6":"r4.51","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cleverpath","cpe5":"portal","cpe6":"r4.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cleverpath","cpe5":"portal","cpe6":"r4.71","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"etrust","cpe5":"security_command_center","cpe6":"r1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"etrust","cpe5":"security_command_center","cpe6":"r8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"unicenter","cpe5":"asset_and_portfolio_management","cpe6":"r11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"unicenter","cpe5":"database_command_center","cpe6":"r11.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"unicenter","cpe5":"database_management_portal","cpe6":"r11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"unicenter","cpe5":"enterprise_job_manager","cpe6":"r1_sp3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"unicenter","cpe5":"management_portal","cpe6":"r11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"unicenter","cpe5":"management_portal","cpe6":"r2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"unicenter","cpe5":"management_portal","cpe6":"r3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"unicenter","cpe5":"workload_control_center","cpe6":"r1_sp4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T20:33:59.669Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"21681","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/21681"},{"name":"ADV-2006-5091","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/5091"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"},{"name":"20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/455041/100/0/threaded"},{"name":"30854","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/30854"},{"name":"1017429","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1017429"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"},{"name":"23426","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23426"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-12-19T00:00:00.000Z","descriptions":[{"lang":"en","value":"Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-17T20:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"21681","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/21681"},{"name":"ADV-2006-5091","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/5091"},{"tags":["x_refsource_CONFIRM"],"url":"http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"},{"name":"20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/455041/100/0/threaded"},{"name":"30854","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/30854"},{"name":"1017429","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1017429"},{"tags":["x_refsource_CONFIRM"],"url":"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"},{"name":"23426","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23426"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-6641","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"21681","refsource":"BID","url":"http://www.securityfocus.com/bid/21681"},{"name":"ADV-2006-5091","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/5091"},{"name":"http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp","refsource":"CONFIRM","url":"http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"},{"name":"20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/455041/100/0/threaded"},{"name":"30854","refsource":"OSVDB","url":"http://www.osvdb.org/30854"},{"name":"1017429","refsource":"SECTRACK","url":"http://securitytracker.com/id?1017429"},{"name":"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876","refsource":"CONFIRM","url":"http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"},{"name":"23426","refsource":"SECUNIA","url":"http://secunia.com/advisories/23426"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-6641","datePublished":"2006-12-20T00:00:00.000Z","dateReserved":"2006-12-19T00:00:00.000Z","dateUpdated":"2024-08-07T20:33:59.669Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-12-20 00:28:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arcserve:brightstor:11.1:*:*:*:*:*:*:*","matchCriteriaId":"6825A6CF-F540-4516-8982-E32B22D477DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:cleverpath_portal:*:*:*:*:*:*:*:*","versionEndIncluding":"4.71","matchCriteriaId":"78D7CC0F-3AAF-40F0-B178-B964AF04BFC7"},{"vulnerable":true,"criteria":"cpe:2.3:a:cleverpath:aion_bpm:r10:*:*:*:*:*:*:*","matchCriteriaId":"1398293A-8C8D-405B-A13B-7202D8A2A12B"},{"vulnerable":true,"criteria":"cpe:2.3:a:cleverpath:aion_bpm:r10.1:*:*:*:*:*:*:*","matchCriteriaId":"F8DC0166-B40B-4FE9-A5FE-4674C184EE68"},{"vulnerable":true,"criteria":"cpe:2.3:a:cleverpath:aion_bpm:r10.2:*:*:*:*:*:*:*","matchCriteriaId":"01482330-54BA-40E1-908C-884CF2C0B139"},{"vulnerable":true,"criteria":"cpe:2.3:a:cleverpath:portal:r4.7:*:*:*:*:*:*:*","matchCriteriaId":"B8D75B44-E386-4BE7-95F6-23804FBFBC87"},{"vulnerable":true,"criteria":"cpe:2.3:a:cleverpath:portal:r4.51:*:*:*:*:*:*:*","matchCriteriaId":"FD878559-D8DF-4043-9F78-2780F95D103A"},{"vulnerable":true,"criteria":"cpe:2.3:a:cleverpath:portal:r4.71:*:*:*:*:*:*:*","matchCriteriaId":"5046BE4F-2445-4CB1-93F1-5BFFA7AD5578"},{"vulnerable":true,"criteria":"cpe:2.3:a:etrust:security_command_center:r1:*:*:*:*:*:*:*","matchCriteriaId":"DDBDB112-8526-4DD5-BE23-45D1E15FDBED"},{"vulnerable":true,"criteria":"cpe:2.3:a:etrust:security_command_center:r8:*:*:*:*:*:*:*","matchCriteriaId":"CEE3CEFA-F003-408D-A066-39C91E958C75"},{"vulnerable":true,"criteria":"cpe:2.3:a:unicenter:asset_and_portfolio_management:r11:*:*:*:*:*:*:*","matchCriteriaId":"6DEA53F1-A4D0-4F12-A0FD-3D726072A063"},{"vulnerable":true,"criteria":"cpe:2.3:a:unicenter:database_command_center:r11.1:*:*:*:*:*:*:*","matchCriteriaId":"056B5064-4FB7-4196-A975-E6661F0C589C"},{"vulnerable":true,"criteria":"cpe:2.3:a:unicenter:database_management_portal:r11:*:*:*:*:*:*:*","matchCriteriaId":"9B0FDF01-4D34-4F2E-9A8E-7A1EB95BC83D"},{"vulnerable":true,"criteria":"cpe:2.3:a:unicenter:enterprise_job_manager:r1_sp3:*:*:*:*:*:*:*","matchCriteriaId":"6E3CFF24-EA58-4B45-8BA7-B6CF02650CAF"},{"vulnerable":true,"criteria":"cpe:2.3:a:unicenter:management_portal:r2.0:*:*:*:*:*:*:*","matchCriteriaId":"84ABEA0B-9388-4942-AC12-40AE37C87D99"},{"vulnerable":true,"criteria":"cpe:2.3:a:unicenter:management_portal:r3.1:*:*:*:*:*:*:*","matchCriteriaId":"BE826A5B-B5D1-46CF-9FA9-81041D9C9187"},{"vulnerable":true,"criteria":"cpe:2.3:a:unicenter:management_portal:r11.0:*:*:*:*:*:*:*","matchCriteriaId":"05619FF7-BB58-434D-8177-16B8D4BC792B"},{"vulnerable":true,"criteria":"cpe:2.3:a:unicenter:workload_control_center:r1_sp4:*:*:*:*:*:*:*","matchCriteriaId":"017280EE-8C88-43FC-BA76-A1EEF4607036"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"6641","Ordinal":"1","Title":"CVE-2006-6641","CVE":"CVE-2006-6641","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"6641","Ordinal":"1","NoteData":"Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server.","Type":"Description","Title":"CVE-2006-6641"},{"CveYear":"2006","CveId":"6641","Ordinal":"2","NoteData":"2006-12-19","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"6641","Ordinal":"3","NoteData":"2018-10-17","Type":"Other","Title":"Modified"}]}}}