SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   CGI.pm Vendors:   Stein, Lincoln D.
(Mandrake Issues Fix) CGI.pm Library Input Validation Flaw Permits Remote Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1007547
SecurityTracker URL:  http://securitytracker.com/id/1007547
CVE Reference:   CVE-2003-0615   (Links to External Site)
Date:  Aug 21 2003
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   An input validation vulnerability was reported in the 'CGI.pm' library. A remote user can conduct cross-site scripting attacks against an application based on the library, depending on how the library is used.

Scripts that use the start_form() function may be affected by this flaw. The function reportedly does not properly filter user-supplied input when creating web forms. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the vulnerable software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A demonstration exploit URL is provided:

http://host/script.pl?">some%20text<!--%20

Whether or not an application that uses the library is affected or not depends on how the library is used.

The vendor was reportedly notified on April 30, 2003.

Eye on Security reported this vulnerability.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running an application based on the library, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   Mandrake has released a fix.

Corporate Server 2.1:
ba7ff50de983c694a0de5a18686defb0 corporate/2.1/RPMS/perl-CGI-3.00-0.2mdk.noarch.rpm
d33e5b70ccb06a6634eb784b987c3709 corporate/2.1/SRPMS/perl-CGI-3.00-0.2mdk.src.rpm

Corporate Server 2.1/x86_64:
ae71f34a21a149948e1f28263cb38a09 x86_64/corporate/2.1/RPMS/perl-CGI-3.00-0.2mdk.noarch.rpm
d33e5b70ccb06a6634eb784b987c3709 x86_64/corporate/2.1/SRPMS/perl-CGI-3.00-0.2mdk.src.rpm

Mandrake Linux 8.2:
287cfec9115ac5395cef982b054d6e0f 8.2/RPMS/perl-CGI-3.00-0.1mdk.noarch.rpm
f30e0a5c1424e2ba6015991bbf4a8760 8.2/SRPMS/perl-CGI-3.00-0.1mdk.src.rpm

Mandrake Linux 8.2/PPC:
0099608448f3ad7074daae3ccb48f4fe ppc/8.2/RPMS/perl-CGI-3.00-0.1mdk.noarch.rpm
f30e0a5c1424e2ba6015991bbf4a8760 ppc/8.2/SRPMS/perl-CGI-3.00-0.1mdk.src.rpm

Mandrake Linux 9.0:
ba7ff50de983c694a0de5a18686defb0 9.0/RPMS/perl-CGI-3.00-0.2mdk.noarch.rpm
d33e5b70ccb06a6634eb784b987c3709 9.0/SRPMS/perl-CGI-3.00-0.2mdk.src.rpm

Mandrake Linux 9.1:
edbef67588070e8b64cc067bc38df59f 9.1/RPMS/perl-CGI-3.00-0.2mdk.noarch.rpm
d33e5b70ccb06a6634eb784b987c3709 9.1/SRPMS/perl-CGI-3.00-0.2mdk.src.rpm

Mandrake Linux 9.1/PPC:
ac48b149899c0ec2dfe3b7eade985253 ppc/9.1/RPMS/perl-CGI-3.00-0.2mdk.noarch.rpm
d33e5b70ccb06a6634eb784b987c3709 ppc/9.1/SRPMS/perl-CGI-3.00-0.2mdk.src.rpm

Multi Network Firewall 8.2:
287cfec9115ac5395cef982b054d6e0f mnf8.2/RPMS/perl-CGI-3.00-0.1mdk.noarch.rpm
f30e0a5c1424e2ba6015991bbf4a8760 mnf8.2/SRPMS/perl-CGI-3.00-0.1mdk.src.rpm

Vendor URL:  stein.cshl.org/WWW/software/CGI/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Mandriva/Mandrake)
Underlying OS Comments:  8.2, 9.0, 9.1, Corporate Server 2.1, Multi Network Firewall 8.2

Message History:   This archive entry is a follow-up to the message listed below.
Jul 21 2003 CGI.pm Library Input Validation Flaw Permits Remote Cross-Site Scripting Attacks



 Source Message Contents

Subject:  MDKSA-2003:084 - Updated perl-CGI packages fix cross-site scripting vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

                Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name:           perl-CGI
Advisory ID:            MDKSA-2003:084
Date:                   August 20th, 2003

Affected versions:	8.2, 9.0, 9.1, Corporate Server 2.1,
			Multi Network Firewall 8.2
________________________________________________________________________

Problem Description:

 Eye on Security found a cross-site scripting vulnerability in the
 start_form() function in CGI.pm.  This vulnerability allows a remote
 attacker to place a web script in a URL which feeds into a form's
 action parameter and allows execution by the browser as if it was
 coming from the site.
________________________________________________________________________

References:
  
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0615
  http://eyeonsecurity.org/advisories/CGI.pm/adv.html
________________________________________________________________________

Updated Packages:
  
 Corporate Server 2.1:
 ba7ff50de983c694a0de5a18686defb0  corporate/2.1/RPMS/perl-CGI-3.00-0.2mdk.noarch.rpm
 d33e5b70ccb06a6634eb784b987c3709  corporate/2.1/SRPMS/perl-CGI-3.00-0.2mdk.src.rpm

 Corporate Server 2.1/x86_64:
 ae71f34a21a149948e1f28263cb38a09  x86_64/corporate/2.1/RPMS/perl-CGI-3.00-0.2mdk.noarch.rpm
 d33e5b70ccb06a6634eb784b987c3709  x86_64/corporate/2.1/SRPMS/perl-CGI-3.00-0.2mdk.src.rpm

 Mandrake Linux 8.2:
 287cfec9115ac5395cef982b054d6e0f  8.2/RPMS/perl-CGI-3.00-0.1mdk.noarch.rpm
 f30e0a5c1424e2ba6015991bbf4a8760  8.2/SRPMS/perl-CGI-3.00-0.1mdk.src.rpm

 Mandrake Linux 8.2/PPC:
 0099608448f3ad7074daae3ccb48f4fe  ppc/8.2/RPMS/perl-CGI-3.00-0.1mdk.noarch.rpm
 f30e0a5c1424e2ba6015991bbf4a8760  ppc/8.2/SRPMS/perl-CGI-3.00-0.1mdk.src.rpm

 Mandrake Linux 9.0:
 ba7ff50de983c694a0de5a18686defb0  9.0/RPMS/perl-CGI-3.00-0.2mdk.noarch.rpm
 d33e5b70ccb06a6634eb784b987c3709  9.0/SRPMS/perl-CGI-3.00-0.2mdk.src.rpm

 Mandrake Linux 9.1:
 edbef67588070e8b64cc067bc38df59f  9.1/RPMS/perl-CGI-3.00-0.2mdk.noarch.rpm
 d33e5b70ccb06a6634eb784b987c3709  9.1/SRPMS/perl-CGI-3.00-0.2mdk.src.rpm

 Mandrake Linux 9.1/PPC:
 ac48b149899c0ec2dfe3b7eade985253  ppc/9.1/RPMS/perl-CGI-3.00-0.2mdk.noarch.rpm
 d33e5b70ccb06a6634eb784b987c3709  ppc/9.1/SRPMS/perl-CGI-3.00-0.2mdk.src.rpm

 Multi Network Firewall 8.2:
 287cfec9115ac5395cef982b054d6e0f  mnf8.2/RPMS/perl-CGI-3.00-0.1mdk.noarch.rpm
 f30e0a5c1424e2ba6015991bbf4a8760  mnf8.2/SRPMS/perl-CGI-3.00-0.1mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
________________________________________________________________________

To upgrade automatically, use MandrakeUpdate or urpmi.  The verification
of md5 checksums and GPG signatures is performed automatically for you.

A list of FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team by executing:

  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other update advisories for Mandrake Linux at:

  http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by
visiting:

  http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/RBQimqjQ0CJFipgRAlD1AKCcLY15QBF7M8q7dJWsJpkgWux4FQCfZiCw
2ajUawaPNwCyUQV+6SZs74E=
=xE/N
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC