CVE-2003-0615
CVSS4.3
发布时间 :2003-08-27 00:00:00
修订时间 :2016-10-17 22:35:51
NMCOS    

[原文]Cross-site scripting (XSS) vulnerability in start_form() of CGI.pm allows remote attackers to insert web script via a URL that is fed into the form's action parameter.


[CNNVD]CGI.pm Start_Form跨站脚本漏洞(CNNVD-200308-158)

        CGI.pm的start_form()存在跨站脚本(XSS)漏洞。远程攻击者可以借助注入表格action参数的URL插入web脚本。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:debian:debian_linux:3.0::ia-32
cpe:/a:openpkg:openpkg:1.3OpenPKG 1.3
cpe:/a:openpkg:openpkg:1.2OpenPKG 1.2
cpe:/o:debian:debian_linux:3.0::ppc
cpe:/o:debian:debian_linux:3.0::arm
cpe:/o:debian:debian_linux:3.0::mipsel
cpe:/a:openpkg:openpkg:current
cpe:/o:debian:debian_linux:3.0::hppa
cpe:/o:debian:debian_linux:3.0::ia-64
cpe:/o:debian:debian_linux:3.0::mips
cpe:/o:debian:debian_linux:3.0::alpha
cpe:/a:cgi.pm:cgi.pm:2.73
cpe:/a:cgi.pm:cgi.pm:2.753
cpe:/o:debian:debian_linux:3.0::m68k
cpe:/a:cgi.pm:cgi.pm:2.74
cpe:/a:cgi.pm:cgi.pm:2.75
cpe:/a:cgi.pm:cgi.pm:2.76
cpe:/o:debian:debian_linux:3.0::sparc
cpe:/a:cgi.pm:cgi.pm:2.751
cpe:/a:cgi.pm:cgi.pm:2.93
cpe:/o:debian:debian_linux:3.0::s-390
cpe:/a:cgi.pm:cgi.pm:2.78
cpe:/a:cgi.pm:cgi.pm:2.79

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:470CGI.pm Cross-site Scripting Vulnerability
oval:org.mitre.oval:def:307CGI.pm start_form Cross-Site Scripting Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0615
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0615
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200308-158
(官方数据源) CNNVD

- 其它链接及资源

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000713
(UNKNOWN)  CONECTIVA  CLA-2003:713
http://marc.info/?l=bugtraq&m=105880349328877&w=2
(UNKNOWN)  BUGTRAQ  20030720 CGI.pm vulnerable to Cross-site Scripting
http://marc.info/?l=bugtraq&m=106018783704468&w=2
(UNKNOWN)  BUGTRAQ  20030806 [OpenPKG-SA-2003.036] OpenPKG Security Advisory (perl-www)
http://marc.info/?l=full-disclosure&m=105875211018698&w=2
(UNKNOWN)  FULLDISC  20030720 CGI.pm vulnerable to Cross-site Scripting.
http://securitytracker.com/id?1007234
(UNKNOWN)  SECTRACK  1007234
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101426-1
(UNKNOWN)  SUNALERT  101426
http://www.ciac.org/ciac/bulletins/n-155.shtml
(UNKNOWN)  CIAC  N-155
http://www.debian.org/security/2003/dsa-371
(UNKNOWN)  DEBIAN  DSA-371
http://www.kb.cert.org/vuls/id/246409
(UNKNOWN)  CERT-VN  VU#246409
http://www.redhat.com/support/errata/RHSA-2003-256.html
(UNKNOWN)  REDHAT  RHSA-2003:256
http://www.securityfocus.com/bid/8231
(VENDOR_ADVISORY)  BID  8231
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:084
(UNKNOWN)  MANDRAKE  MDKSA-2003:084
http://xforce.iss.net/xforce/xfdb/12669
(UNKNOWN)  XF  cgi-startform-xss(12669)

- 漏洞信息

CGI.pm Start_Form跨站脚本漏洞
中危 跨站脚本
2003-08-27 00:00:00 2005-10-20 00:00:00
远程  
        CGI.pm的start_form()存在跨站脚本(XSS)漏洞。远程攻击者可以借助注入表格action参数的URL插入web脚本。

- 公告与补丁

        NOTE: The vendor has reported that this vulnerability has been addressed in CGI.pm version 2.94. Customers who are affected by this issue should upgrade to the current version 2.98 to address this issue.
        Please see the referenced vendor advisories for more information.
        SOTLinux SOTLinux 2003 Desktop
        
        SOTLinux SOTLinux 2003 Server
        
        Sun Solaris 9
        
        Sun Solaris 9_x86
        
        Sun Solaris 8_x86
        
        OpenPKG OpenPKG 1.3
        
        MandrakeSoft Corporate Server 2.1
        
        CGI.pm CGI.pm 2.73
        
        CGI.pm CGI.pm 2.74
        
        CGI.pm CGI.pm 2.75
        
        CGI.pm CGI.pm 2.751
        
        CGI.pm CGI.pm 2.753
        
        CGI.pm CGI.pm 2.76
        
        CGI.pm CGI.pm 2.78
        
        CGI.pm CGI.pm 2.79
        

- 漏洞信息

6347
CGI.pm Multiple Function XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

CGI.pm contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate $action variables upon submission to the startform() script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2003-07-19 2003-04-30
2003-07-19 Unknow

- 解决方案

Upgrade to version 2.99 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): Apply patch for 2.98 or Add the following line in startform() function, after subroutine "unless (defined $action) { }" $action =~ s/\"/%22/g; # fix cross-site scripting bug reported by obscure

- 相关参考

- 漏洞作者

- 漏洞信息

CGI.pm Start_Form Cross-Site Scripting Vulnerability
Input Validation Error 8231
Yes No
2003-07-20 12:00:00 2009-07-11 10:56:00
Discovery of this issue is credited to obscure <dontreply@eyeonsecurity.org>.

- 受影响的程序版本

Sun Solaris 9_x86 Update 2
Sun Solaris 9_x86
Sun Solaris 9
Sun Solaris 8_x86
Sun Solaris 8_sparc
Sun Linux 5.0.7
SOTLinux SOTLinux 2003 Server
SOTLinux SOTLinux 2003 Desktop
SGI ProPack 2.3
SGI ProPack 2.2.1
SCO Open Server 5.0.7
SCO Open Server 5.0.6 a
SCO Open Server 5.0.6
SCO Open Server 5.0.5
RedHat Linux Advanced Work Station 2.1
RedHat Enterprise Linux WS 2.1 IA64
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 2.1 IA64
RedHat Enterprise Linux ES 2.1
Red Hat Enterprise Linux AS 2.1 IA64
Red Hat Enterprise Linux AS 2.1
OpenPKG OpenPKG 1.3
OpenPKG OpenPKG 1.2
OpenPKG OpenPKG Current
Mandriva Linux Mandrake 9.1 ppc
Mandriva Linux Mandrake 9.1
Mandriva Linux Mandrake 9.0
Mandriva Linux Mandrake 8.2 ppc
Mandriva Linux Mandrake 8.2
MandrakeSoft Single Network Firewall 7.2
MandrakeSoft Corporate Server 2.1
Debian Linux 3.0 sparc
Debian Linux 3.0 s/390
Debian Linux 3.0 ppc
Debian Linux 3.0 mipsel
Debian Linux 3.0 mips
Debian Linux 3.0 m68k
Debian Linux 3.0 ia-64
Debian Linux 3.0 ia-32
Debian Linux 3.0 hppa
Debian Linux 3.0 arm
Debian Linux 3.0 alpha
CGI.pm CGI.pm 2.753
CGI.pm CGI.pm 2.752
+ Sun Solaris 9_x86
+ Sun Solaris 9
CGI.pm CGI.pm 2.751
CGI.pm CGI.pm 2.93
CGI.pm CGI.pm 2.79
CGI.pm CGI.pm 2.78
CGI.pm CGI.pm 2.76
CGI.pm CGI.pm 2.75
CGI.pm CGI.pm 2.74
CGI.pm CGI.pm 2.73
CGI.pm CGI.pm 2.46
CGI.pm CGI.pm 2.98
CGI.pm CGI.pm 2.97
CGI.pm CGI.pm 2.96
CGI.pm CGI.pm 2.95
CGI.pm CGI.pm 2.94

- 不受影响的程序版本

CGI.pm CGI.pm 2.98
CGI.pm CGI.pm 2.97
CGI.pm CGI.pm 2.96
CGI.pm CGI.pm 2.95
CGI.pm CGI.pm 2.94

- 漏洞讨论

CGI.pm is prone to cross-site scripting attacks under some circumstances. This issue occurs because the 'start_form()' function (or other functions that use this function) does not sufficiently sanitize HTML and script code when a form action isn't specified. This could expose scripts that use the function to cross-site scripting attacks.

- 漏洞利用

There is no exploit required.

- 解决方案

NOTE: The vendor has reported that this vulnerability has been addressed in CGI.pm version 2.94. Customers who are affected by this issue should upgrade to the current version 2.98 to address this issue.

Please see the referenced vendor advisories for more information.


SOTLinux SOTLinux 2003 Desktop

SOTLinux SOTLinux 2003 Server

Sun Solaris 9

Sun Solaris 9_x86

Sun Solaris 8_x86

OpenPKG OpenPKG 1.3

MandrakeSoft Corporate Server 2.1

CGI.pm CGI.pm 2.73

CGI.pm CGI.pm 2.74

CGI.pm CGI.pm 2.75

CGI.pm CGI.pm 2.751

CGI.pm CGI.pm 2.753

CGI.pm CGI.pm 2.76

CGI.pm CGI.pm 2.78

CGI.pm CGI.pm 2.79

CGI.pm CGI.pm 2.93

Debian Linux 3.0 s/390

Debian Linux 3.0 alpha

Debian Linux 3.0 mips

Debian Linux 3.0 mipsel

Debian Linux 3.0 m68k

Debian Linux 3.0 hppa

Debian Linux 3.0 arm

Debian Linux 3.0 sparc

Debian Linux 3.0 ia-64

Debian Linux 3.0 ppc

Debian Linux 3.0 ia-32

Sun Linux 5.0.7

MandrakeSoft Single Network Firewall 7.2

Mandriva Linux Mandrake 8.2

Mandriva Linux Mandrake 8.2 ppc

Mandriva Linux Mandrake 9.0

Mandriva Linux Mandrake 9.1 ppc

Mandriva Linux Mandrake 9.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站