Vulnerability Name: | CVE-2002-0738 (CCN-8894) | ||||||||
Assigned: | 2002-04-18 | ||||||||
Published: | 2002-04-18 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | MHonArc 2.5.2 and earlier does not properly filter Javascript from archived e-mail messages, which could allow remote attackers to execute script in web clients by (1) splitting the SCRIPT tag into smaller pieces, (2) including the script in a SRC argument to an IMG tag, or (3) using "&={script}" syntax. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: BUGTRAQ Type: UNKNOWN 20020418 MHonArc v2.5.2 Script Filtering Bypass Vulnerability Source: CCN Type: BugTraq Mailing List, Thu Apr 18 2002 - 16:53:54 CDT MHonArc v2.5.2 Script Filtering Bypass Vulnerability Source: MITRE Type: CNA CVE-2002-0738 Source: DEBIAN Type: UNKNOWN DSA-163 Source: DEBIAN Type: DSA-163 mhonarc -- cross site scripting Source: XF Type: Patch, Vendor Advisory mhonarc-script-filtering-bypass(8894) Source: CCN Type: MHonArc Web site MHonArc Source: CONFIRM Type: Vendor Advisory http://www.mhonarc.org/MHonArc/CHANGES Source: CCN Type: OSVDB ID: 5121 MHonArc mhtxthtml.pl Javascript Filter Bypass Source: BID Type: Patch, Vendor Advisory 4546 Source: CCN Type: BID-4546 MHonArc HTML Script Filter Bypass Vulnerability Source: XF Type: UNKNOWN mhonarc-script-filtering-bypass(8894) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |