Vulnerability Note VU#246409
CGI.pm vulnerable to Cross-site Scripting
The Common Gateway Interface, or CGI, is a standard for external gateway programs to interface with information servers such as HTTP servers. The standard Perl distribution and many vendor's repackaged Perl systems include a CGI library known as CGI.pm. This module offers a set of functions for creating fill-out forms, among other things.
Some versions of the CGI.pm module contain a vulnerability in handling of the action in the start_form() and start_multipart_form() functions. When the action for the form is not specified, a default based on the user-supplied URL is used. Because the value of this expression is not sanitized by the module before processing and contains user-supplied data or data received from untrustworthy sources, a remote attacker may be able to inject HTML or malicious script. A user of the vulnerable site or web application may then be tricked into interpreting the HTML or executing the script in a situation where they normally might not.
The victim will be presented with information that the vulnerable site did not wish their visitors to be subjected to. This could be used to "sniff" sensitive data from within the web page, including passwords, credit card numbers, and any arbitrary information the user inputs. This exploitation vector is commonly referred to as a cross-site scripting attack.
Apply a patch from the vendor
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Conectiva||Affected||-||30 Jul 2003|
|Debian||Affected||-||21 Aug 2003|
|Lincoln Stein||Affected||-||07 Oct 2003|
|MandrakeSoft||Affected||-||02 Sep 2003|
|OpenBSD||Affected||-||02 Sep 2003|
|OpenPKG||Affected||-||07 Oct 2003|
|Red Hat Inc.||Affected||-||07 Oct 2003|
|SCO||Affected||-||13 Nov 2003|
|Sun Microsystems Inc.||Affected||-||11 Feb 2004|
CVSS Metrics (Learn More)
Thanks to Obscure for reporting this vulnerability.
This document was written by Chad R Dougherty with feedback from Sean Levy.
- CVE IDs: CAN-2003-0615
- Date Public: 19 Jul 2003
- Date First Published: 07 Oct 2003
- Date Last Updated: 23 Feb 2004
- Severity Metric: 15.00
- Document Revision: 10
If you have feedback, comments, or additional information about this vulnerability, please send us email.