Vulnerability Name:

CVE-2003-0442 (CCN-12259)

Assigned:2003-05-11
Published:2003-05-11
Updated:2018-05-03
Summary:Cross-site scripting (XSS) vulnerability in the transparent SID support capability for PHP before 4.3.2 (session.use_trans_sid) allows remote attackers to insert arbitrary script via the PHPSESSID parameter.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Fri May 30 2003 - 07:41:53 CDT
PHP Trans SID XSS (Was: New php release with security fixes)

Source: MITRE
Type: CNA
CVE-2003-0442

Source: CONECTIVA
Type: UNKNOWN
CLSA-2003:691

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:691
php4

Source: BUGTRAQ
Type: UNKNOWN
20030530 PHP Trans SID XSS (Was: New php release with security fixes)

Source: BUGTRAQ
Type: UNKNOWN
20030707 [OpenPKG-SA-2003.032] OpenPKG Security Advisory (php)

Source: CCN
Type: RHSA-2003-204
Updated PHP packages are now available

Source: CCN
Type: SECTRACK ID: 1008653
PHP Input Validation Flaw in Transparent Session ID Support Permits Cross-Site Scripting Attacks

Source: CCN
Type: Sverre's Security Advisories #5 2003-05-11
Cross-site Scripting in PHP's Transparent Session ID Support

Source: MISC
Type: Exploit, Patch, Vendor Advisory
http://shh.thathost.com/secadv/2003-05-11-php.txt

Source: CCN
Type: PHP Web site
PHP: Hypertext Preprocessor

Source: CCN
Type: CIAC Information Bulletin N-112
Red Hat Updated PHP Packages Fix Bugs

Source: CIAC
Type: UNKNOWN
N-112

Source: DEBIAN
Type: UNKNOWN
DSA-351

Source: DEBIAN
Type: DSA-351
php4 -- cross-site scripting

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:082

Source: CCN
Type: OpenPKG-SA-2003.032
PHP

Source: OSVDB
Type: UNKNOWN
4758

Source: CCN
Type: OSVDB ID: 4758
PHP session.use_trans_sid PHPSESSID Parameter XSS

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2003:204

Source: BID
Type: UNKNOWN
7761

Source: CCN
Type: BID-7761
PHP Transparent Session ID Cross Site Scripting Vulnerability

Source: SECTRACK
Type: UNKNOWN
1008653

Source: TURBO
Type: UNKNOWN
TLSA-2003-47

Source: CCN
Type: TLSA-2003-47
Cross-site scripting vulnerability

Source: XF
Type: UNKNOWN
php-session-id-xss(12259)

Source: XF
Type: UNKNOWN
php-session-id-xss(12259)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:485

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:*:*:*:*:*:*:*:* (Version <= 4.3.1)

  • Configuration 2:
  • cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:rc2:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030442
    V
    CVE-2003-0442
    2015-11-16
    oval:org.mitre.oval:def:485
    V
    PH Cross-site Scripting Vulnerability
    2007-04-25
    oval:org.debian:def:351
    V
    cross-site scripting
    2003-07-16
    BACK
    php php *
    redhat linux 8.0
    redhat linux 9.0
    php php 4.0.5
    php php 4.1.1
    php php 4.2.0
    php php 4.2.1
    php php 4.2.3
    php php 4.2.2
    php php 4.3.0
    php php 4.0 beta1
    php php 4.0.1
    php php 4.0.2
    php php 4.0.3
    php php 4.0.4
    php php 4.0.6
    php php 4.0.7
    php php 4.0 beta_4_patch1
    php php 4.0 beta1
    php php 4.0 beta2
    php php 4.0 beta3
    php php 4.0 beta4
    php php 4.1.0
    php php 4.1.2
    php php 4.3.1
    php php 4.0 rc1
    php php 4.0 rc2
    redhat linux 7
    redhat linux 7.1
    conectiva linux 7.0
    redhat linux 7.2
    mandrakesoft mandrake linux 8.2
    conectiva linux 8.0
    redhat linux 7.3
    debian debian linux 3.0
    openpkg openpkg current
    redhat linux 8.0
    openpkg openpkg 1.1
    mandrakesoft mandrake linux 9.0
    mandrakesoft mandrake multi network firewall 8.2
    openpkg openpkg 1.2
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux 9.1
    redhat linux 9.0
    conectiva linux 9.0
    mandrakesoft mandrake linux 8.2
    mandrakesoft mandrake linux 9.1
    mandrakesoft mandrake linux corporate server 2.1