{ "id": "CVE-2003-0273", "sourceIdentifier": "cve@mitre.org", "published": "2003-05-27T04:00:00.000", "lastModified": "2016-10-18T02:31:32.340", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the web interface for Request Tracker (RT) 1.0 through 1.0.7 allows remote attackers to execute script via message bodies." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados en la interfaz web para Request Racker (RT) 1.0 hasta 1.0.7 permite que atacantes remotos ejecuten script mediante cuerpos de mensaje." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:best_practical_solutions:request_tracker:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2F65B45-6E6B-4D11-BDDF-B3DC30D2DC68" }, { "vulnerable": true, "criteria": "cpe:2.3:a:best_practical_solutions:request_tracker:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B66386D6-1DFF-4764-8B5B-799F55946037" }, { "vulnerable": true, "criteria": "cpe:2.3:a:best_practical_solutions:request_tracker:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD0B7CC2-DBBE-4C49-BB6D-05E2A9465231" }, { "vulnerable": true, "criteria": "cpe:2.3:a:best_practical_solutions:request_tracker:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "788CEFFE-1D90-4C59-9878-01AD5D152A98" }, { "vulnerable": true, "criteria": "cpe:2.3:a:best_practical_solutions:request_tracker:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37CADA80-96C3-4B5C-A3FB-79E1A24CBF96" }, { "vulnerable": true, "criteria": "cpe:2.3:a:best_practical_solutions:request_tracker:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE92A900-18E0-42E2-A8CB-355F3D125151" }, { "vulnerable": true, "criteria": "cpe:2.3:a:best_practical_solutions:request_tracker:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "61C413C7-BD53-4FA1-B935-492F18AEDFAC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:best_practical_solutions:request_tracker:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "00F4C061-E16A-44A3-80D7-68677924A58A" } ] } ] } ], "references": [ { "url": "http://lists.fsck.com/pipermail/rt-announce/2003-May/000071.html", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://marc.info/?l=bugtraq&m=105240947225275&w=2", "source": "cve@mitre.org" } ] }