{ "id": "CVE-2004-1837", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", "lastModified": "2024-11-20T23:51:51.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Mod_survey 3.0.x before 3.0.16-pre2 and 3.2.x before 3.2.0-pre4 allows remote attackers to inject arbitrary web script or HTML via the certain survey fields or error messages for malformed query strings." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "84C6F7CF-379B-494B-9FAB-DD06AF256BB6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "19337D40-5CBA-4AC8-95E9-86A53EFD457D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A19D7A2A-DE99-4D2B-83E4-D8644E0EB8B6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D510D744-56AE-41A2-81F6-B65E8D04DE09" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DCAA6EF6-F954-4730-A8E5-43E765516487" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F47AB63B-4F41-4A8E-9F21-969F73189E27" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "F87C7282-28D7-4E49-BFC2-CC1B116CF0B3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "E3DA2438-B41C-4C57-9FB3-9C256E519585" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "FD3C22CE-2DBC-40C4-A613-0BE42286972D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "9545D2F5-7274-464A-AB87-5AA1D629F9B5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "A929CF9B-F812-4154-8C22-528C33EE1AF6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "3DD9517C-0C0C-4FEA-98A7-69E7F5B9E22A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "8F48DEB2-B56A-4B5C-918E-598DBC366BCF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.14d:*:*:*:*:*:*:*", "matchCriteriaId": "6154B066-7B2C-493A-93BE-3D201AF9AA55" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.14e:*:*:*:*:*:*:*", "matchCriteriaId": "C49FE1AD-1307-43A6-A51B-2BBA554A0C37" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "157456DF-C949-4FF1-9591-551CCA4B35F1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.15_pre1:*:*:*:*:*:*:*", "matchCriteriaId": "FB02B770-A5A7-44D0-AB7B-F00F0E16CE95" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.15_pre2:*:*:*:*:*:*:*", "matchCriteriaId": "4A8E252D-FC02-4FA3-B7DD-008A4FF4BFB4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.15_pre3:*:*:*:*:*:*:*", "matchCriteriaId": "5FAA978A-968C-487E-8EBB-C86AF5C0CA14" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.15_pre4:*:*:*:*:*:*:*", "matchCriteriaId": "04B5B370-1301-41AD-903F-46803862C93F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.15_pre5:*:*:*:*:*:*:*", "matchCriteriaId": "5A19AD91-9325-4488-94A5-F675B2233333" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.15_pre6:*:*:*:*:*:*:*", "matchCriteriaId": "A93FBDF3-3D4E-4BE0-BFE3-9348F15FA466" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.0.16_pre1:*:*:*:*:*:*:*", "matchCriteriaId": "9235168E-C402-4D15-94E6-7A8D00DE6EE9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.2.0_pre1:*:*:*:*:*:*:*", "matchCriteriaId": "FBD084A2-B2C8-448A-9BEF-0104C035BBFC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.2.0_pre2:*:*:*:*:*:*:*", "matchCriteriaId": "1133B635-79A2-4554-A857-61A25FD0B143" }, { "vulnerable": true, "criteria": "cpe:2.3:a:joel_palmius:mod_survey:3.2.0_pre3:*:*:*:*:*:*:*", "matchCriteriaId": "41BDAF43-3675-4DBF-86D4-0EDA392A1CD0" } ] } ] } ], "references": [ { "url": "http://marc.info/?l=bugtraq&m=107997967421972&w=2", "source": "cve@mitre.org" }, { "url": "http://securitytracker.com/id?1009516", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://www.securityfocus.com/bid/9941", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15582", "source": "cve@mitre.org" }, { "url": "http://marc.info/?l=bugtraq&m=107997967421972&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://securitytracker.com/id?1009516", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ] }, { "url": "http://www.securityfocus.com/bid/9941", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15582", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }