Vulnerabilities > CVE-2003-0615 - Cross-Site Scripting vulnerability in CGI.pm Start_Form

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
cgi-pm
openpkg
debian
nessus

Summary

Cross-site scripting (XSS) vulnerability in start_form() of CGI.pm allows remote attackers to insert web script via a URL that is fed into the form's action parameter.

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-371.NASL
    descriptionA cross-site scripting vulnerability exists in the start_form() function in CGI.pm. This function outputs user-controlled data into the action attribute of a form element without sanitizing it, allowing a remote user to execute arbitrary web script within the context of the generated page. Any program which uses this function in the CGI.pm module may be affected.
    last seen2020-06-01
    modified2020-06-02
    plugin id15208
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15208
    titleDebian DSA-371-1 : perl - XSS
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2003-084.NASL
    descriptionEye on Security found a cross-site scripting vulnerability in the start_form() function in CGI.pm. This vulnerability allows a remote attacker to place a web script in a URL which feeds into a form
    last seen2020-06-01
    modified2020-06-02
    plugin id14066
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14066
    titleMandrake Linux Security Advisory : perl-CGI (MDKSA-2003:084)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2003-257.NASL
    descriptionUpdated Perl packages that fix a security issue in Safe.pm and a cross-site scripting (XSS) vulnerability in CGI.pm are now available. Perl is a high-level programming language commonly used for system administration utilities and Web programming. Two security issues have been found in Perl that affect the Perl packages shipped with Red Hat Enterprise Linux : When safe.pm versions 2.0.7 and earlier are used with Perl 5.8.0 and earlier, it is possible for an attacker to break out of safe compartments within Safe::reval and Safe::rdo by using a redefined @_ variable. This is due to the fact that the redefined @_ variable is not reset between successive calls. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2002-1323 to this issue. A cross-site scripting vulnerability was discovered in the start_form() function of CGI.pm. The vulnerability allows a remote attacker to insert a Web script via a URL fed into the form
    last seen2020-06-01
    modified2020-06-02
    plugin id12415
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/12415
    titleRHEL 2.1 : perl (RHSA-2003:257)

Oval

  • accepted2008-07-07T04:00:16.879-04:00
    classvulnerability
    contributors
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameNabil Ouchn
      organizationSecurity-Database
    • nameDragos Prisaca
      organizationSecure Elements, Inc.
    definition_extensions
    • commentSolaris 8 (SPARC) is installed
      ovaloval:org.mitre.oval:def:1539
    • commentSolaris 8 (x86) is installed
      ovaloval:org.mitre.oval:def:2059
    • commentSolaris 9 (SPARC) is installed
      ovaloval:org.mitre.oval:def:1457
    • commentSolaris 9 (x86) is installed
      ovaloval:org.mitre.oval:def:1683
    descriptionCross-site scripting (XSS) vulnerability in start_form() of CGI.pm allows remote attackers to insert web script via a URL that is fed into the form's action parameter.
    familyunix
    idoval:org.mitre.oval:def:307
    statusaccepted
    submitted2006-09-22T05:52:00.000-04:00
    titleCGI.pm start_form Cross-Site Scripting Vulnerability
    version37
  • accepted2007-04-25T19:52:33.013-04:00
    classvulnerability
    contributors
    • nameJay Beale
      organizationBastille Linux
    • nameThomas R. Jones
      organizationMaitreya Security
    descriptionCross-site scripting (XSS) vulnerability in start_form() of CGI.pm allows remote attackers to insert web script via a URL that is fed into the form's action parameter.
    familyunix
    idoval:org.mitre.oval:def:470
    statusaccepted
    submitted2003-09-25T12:00:00.000-04:00
    titleCGI.pm Cross-site Scripting Vulnerability
    version37

Redhat

advisories
rhsa
idRHSA-2003:256