| Vulnerability Name: | CVE-2005-3973 (CCN-23473) | ||||||||
| Assigned: | 2005-12-01 | ||||||||
| Published: | 2005-12-01 | ||||||||
| Updated: | 2018-10-19 | ||||||||
| Summary: | Multiple cross-site scripting (XSS) vulnerabilities in Drupal 4.5.0 through 4.5.5 and 4.6.0 through 4.6.3 allow remote attackers to inject arbitrary web script or HTML via various HTML tags and values, such as the (1) legend tag and the value parameter used in (2) label and (3) input tags, possibly due to an incomplete blacklist. | ||||||||
| CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||
| References: | Source: CCN Type: Full-Disclosure Mailing List, Thu Dec 01 2005 - 09:45:58 CST [DRUPAL-SA-2005-008] Drupal 4.6.4 / 4.5.6 fixes XSS and HTTP header injection issue Source: MITRE Type: CNA CVE-2005-3973 Source: MISC Type: UNKNOWN http://drupal.org/files/sa-2005-007/4.6.3.patch Source: CONFIRM Type: Patch, Vendor Advisory http://drupal.org/files/sa-2005-007/advisory.txt Source: CCN Type: Drupal Web site Drupal Source: CCN Type: SA17824 Drupal Multiple Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory 17824 Source: SECUNIA Type: UNKNOWN 18630 Source: DEBIAN Type: UNKNOWN DSA-958 Source: DEBIAN Type: DSA-958 drupal -- several vulnerabilities Source: CCN Type: OSVDB ID: 21351 Drupal Multiple HTML/SGML Tag XSS Source: BUGTRAQ Type: UNKNOWN 20051201 [DRUPAL-SA-2005-007] Drupal 4.6.4 / 4.5.6 fixes XSS issue Source: BID Type: Patch 15677 Source: CCN Type: BID-15677 Drupal Submitted Content HTML Injection Vulnerability Source: VUPEN Type: UNKNOWN ADV-2005-2684 Source: XF Type: UNKNOWN drupal-unknown-http-header-injection(23473) | ||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
| Oval Definitions | |||||||||
| |||||||||
| BACK | |||||||||