CVE-2003-0615 Affecting perl package, versions <5.8.0-19
Threat Intelligence
EPSS
1.1% (85th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-PERL-529721
- published 27 Aug 2003
- disclosed 27 Aug 2003
Introduced: 27 Aug 2003
CVE-2003-0615 Open this link in a new tabHow to fix?
Upgrade Debian:11
perl
to version 5.8.0-19 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream perl
package and not the perl
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
Cross-site scripting (XSS) vulnerability in start_form() of CGI.pm allows remote attackers to insert web script via a URL that is fed into the form's action parameter.
References
- https://security-tracker.debian.org/tracker/CVE-2003-0615
- http://www.kb.cert.org/vuls/id/246409
- http://www.ciac.org/ciac/bulletins/n-155.shtml
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000713
- http://www.debian.org/security/2003/dsa-371
- http://marc.info/?l=bugtraq&m=105880349328877&w=2
- http://marc.info/?l=bugtraq&m=106018783704468&w=2
- http://marc.info/?l=full-disclosure&m=105875211018698&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A307
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A470
- http://securitytracker.com/id?1007234
- http://secunia.com/advisories/13638
- http://www.securityfocus.com/bid/8231
- https://exchange.xforce.ibmcloud.com/vulnerabilities/12669
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101426-1
- http://www.redhat.com/support/errata/RHSA-2003-256.html
- http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:084
CVSS Scores
version 3.1