Vulnerability Name: | CVE-2003-0038 (CCN-11152) | ||||||||
Assigned: | 2003-01-24 | ||||||||
Published: | 2003-01-24 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Cross-site scripting (XSS) vulnerability in options.py for Mailman 2.1 allows remote attackers to inject script or HTML into web pages via the (1) email or (2) language parameters. | ||||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
2.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Fri Jan 24 2003 - 08:35:07 CST Mailman: cross-site scripting bug Source: MITRE Type: CNA CVE-2003-0038 Source: BUGTRAQ Type: UNKNOWN 20030124 Mailman: cross-site scripting bug Source: CCN Type: SECTRACK ID: 1005987 Mailman List Software Input Validation Flaw in `email` Variable Allows Remote Users to Conduct Cross-Site Scripting Attacks Source: CONFIRM Type: Patch http://telia.dl.sourceforge.net/sourceforge/mailman/xss-2.1.0-patch.txt Source: DEBIAN Type: Patch, Vendor Advisory DSA-436 Source: DEBIAN Type: DSA-436 mailman -- several vulnerabilities Source: CCN Type: Gentoo Linux Security Announcement 2003-02-17 09:16 UTC mailman -- cross site scripting Source: OSVDB Type: UNKNOWN 9205 Source: CCN Type: OSVDB ID: 9205 Mailman options.py email Parameter XSS Source: BID Type: UNKNOWN 6677 Source: CCN Type: BID-6677 GNU Mailman email Cross Site Scripting Vulnerability Source: SECTRACK Type: UNKNOWN 1005987 Source: XF Type: UNKNOWN mailman-email-variable-xss(11152) Source: XF Type: UNKNOWN mailman-email-variable-xss(11152) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
Vulnerability Name: | CVE-2003-0038 (CCN-11175) | ||||||||
Assigned: | 2003-01-24 | ||||||||
Published: | 2003-01-24 | ||||||||
Updated: | 2003-01-24 | ||||||||
Summary: | GNU Mailman is vulnerable to cross-site scripting, caused by improper filtering of user-supplied input. A remote attacker could embed malicious script within a URL request, which would be executed in the victim's Web browser within the security context of the hosting site, once the link is clicked and an error page is returned. An attacker could use this vulnerability to steal a victim's cookie-based authentication credentials. | ||||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
2.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
| ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Fri Jan 24 2003 - 08:35:07 CST Mailman: cross-site scripting bug Source: CCN Type: BugTraq Mailing List, Sun Jan 26 2003 - 15:52:32 CST Re: Mailman: cross-site scripting bug Source: MITRE Type: CNA CVE-2003-0038 Source: CCN Type: SECTRACK ID: 1005987 Mailman List Software Input Validation Flaw in `email` Variable Allows Remote Users to Conduct Cross-Site Scripting Attacks Source: CCN Type: Mailman Web site Project: Mailman: File List Source: DEBIAN Type: DSA-436 mailman -- several vulnerabilities Source: CCN Type: Gentoo Linux Security Announcement 2003-02-17 09:16 UTC mailman -- cross site scripting Source: CCN Type: OSVDB ID: 9205 Mailman options.py email Parameter XSS Source: CCN Type: BID-6677 GNU Mailman email Cross Site Scripting Vulnerability Source: CCN Type: BID-6678 GNU Mailman Error Page Cross Site Scripting Vulnerability Source: XF Type: UNKNOWN mailman-error-page-xss(11175) | ||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |