High severity7.5NVD Advisory· Published Dec 21, 2006· Updated Apr 23, 2026
CVE-2006-6679
CVE-2006-6679
Description
Pedro Lineu Orso chetcpasswd before 2.4 relies on the X-Forwarded-For HTTP header when verifying a client's status on an IP address ACL, which allows remote attackers to gain unauthorized access by spoofing this header.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- bugs.debian.org/cgi-bin/bugreport.cginvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- secunia.com/advisories/22967nvdBroken LinkPermissions RequiredThird Party Advisory
- www.securityfocus.com/bid/21102nvdBroken LinkThird Party AdvisoryVDB Entry
- exchange.xforce.ibmcloud.com/vulnerabilities/30451nvdThird Party AdvisoryVDB Entry
- sourceforge.net/project/shownotes.phpnvdProduct
- www.osvdb.org/30544nvdBroken Link
News mentions
0No linked articles in our index yet.