CVE-2004-1177
CVSS4.3
发布时间 :2005-01-10 00:00:00
修订时间 :2016-10-17 22:52:02
NMCO    

[原文]Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.


[CNNVD]mailman ErrorPage 跨站脚本攻击漏洞(CNNVD-200501-169)

        Mailman是由Python开发的共享软件,利用它可以管理邮件列表。
        Mailman 2.1.5之前版本呢存在跨站脚本攻击漏洞。
        由于在返回错误页面时没有充分过滤输入,远程攻击者可以利用这个漏洞注入任意Web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:gnu:mailman:2.0.7GNU Mailman 2.0.7
cpe:/a:gnu:mailman:2.0:beta5GNU Mailman 2.0 beta5
cpe:/a:gnu:mailman:2.1GNU Mailman 2.1
cpe:/a:gnu:mailman:1.1GNU Mailman 1.1
cpe:/a:gnu:mailman:2.0GNU Mailman 2.0
cpe:/a:gnu:mailman:2.0:beta3GNU Mailman 2.0 beta3
cpe:/a:gnu:mailman:2.1b1GNU Mailman 2.1b1
cpe:/a:gnu:mailman:1.0GNU Mailman 1.0
cpe:/a:gnu:mailman:2.0:beta4GNU Mailman 2.0 beta4
cpe:/a:gnu:mailman:2.0.8GNU Mailman 2.0.8
cpe:/a:gnu:mailman:2.0.13GNU Mailman 2.0.13
cpe:/a:gnu:mailman:2.0.3GNU Mailman 2.0.3
cpe:/a:gnu:mailman:2.1.2GNU Mailman 2.1.2
cpe:/a:gnu:mailman:2.0.10GNU Mailman 2.0.10
cpe:/a:gnu:mailman:2.0.6GNU Mailman 2.0.6
cpe:/a:gnu:mailman:2.0.9GNU Mailman 2.0.9
cpe:/a:gnu:mailman:2.0.12GNU Mailman 2.0.12
cpe:/a:gnu:mailman:2.0.4GNU Mailman 2.0.4
cpe:/a:gnu:mailman:2.1.3GNU Mailman 2.1.3
cpe:/a:gnu:mailman:2.0.2GNU Mailman 2.0.2
cpe:/a:gnu:mailman:2.1.1GNU Mailman 2.1.1
cpe:/a:gnu:mailman:2.0.11GNU Mailman 2.0.11
cpe:/a:gnu:mailman:2.0.5GNU Mailman 2.0.5
cpe:/a:gnu:mailman:2.1.4GNU Mailman 2.1.4
cpe:/a:gnu:mailman:2.0.1GNU Mailman 2.0.1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11113Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1177
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1177
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200501-169
(官方数据源) CNNVD

- 其它链接及资源

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=287555
(PATCH)  CONFIRM  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=287555
http://marc.info/?l=bugtraq&m=110549296126351&w=2
(UNKNOWN)  BUGTRAQ  20050110 [USN-59-1] mailman vulnerabilities
http://www.debian.org/security/2005/dsa-674
(VENDOR_ADVISORY)  DEBIAN  DSA-674
http://www.mandriva.com/security/advisories?name=MDKSA-2005:015
(UNKNOWN)  MANDRAKE  MDKSA-2005:015
http://www.novell.com/linux/security/advisories/2005_07_mailman.html
(UNKNOWN)  SUSE  SUSE-SA:2005:007
http://www.redhat.com/support/errata/RHSA-2005-235.html
(UNKNOWN)  REDHAT  RHSA-2005:235
http://xforce.iss.net/xforce/xfdb/18854
(UNKNOWN)  XF  mailman-script-driver-xss(18854)

- 漏洞信息

mailman ErrorPage 跨站脚本攻击漏洞
中危 跨站脚本
2005-01-10 00:00:00 2005-10-20 00:00:00
远程  
        Mailman是由Python开发的共享软件,利用它可以管理邮件列表。
        Mailman 2.1.5之前版本呢存在跨站脚本攻击漏洞。
        由于在返回错误页面时没有充分过滤输入,远程攻击者可以利用这个漏洞注入任意Web脚本或HTML。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://sourceforge.net/projects/mailman/files/

- 漏洞信息

12855
Mailman Automatic Password Generation Weakness
Remote / Network Access Authentication Management
Loss of Confidentiality
Exploit Unknown

- 漏洞描述

Mailman contains a flaw that may allow a malicious user to determine a user's password. The issue is triggered when a malicious user attempts to brute force an account with the five million possible passwords. It is possible that the flaw may allow unauthorized access resulting in a loss of confidentiality.

- 时间线

2005-01-12 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站