gsd-2004-1621
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
** DISPUTED ** NOTE: this issue has been disputed by the vendor. Cross-site scripting (XSS) vulnerability in IBM Lotus Notes R6 and Domino R6, and possibly earlier versions, allows remote attackers to execute arbitrary web script or HTML via square brackets at the beginning and end of (1) computed for display, (2) computed when composed, or (3) computed text element fields. NOTE: the vendor has disputed this issue, saying that it is not a problem with Notes/Domino itself, but with the applications that do not properly handle this feature.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2004-1621", "description": "** DISPUTED ** NOTE: this issue has been disputed by the vendor. Cross-site scripting (XSS) vulnerability in IBM Lotus Notes R6 and Domino R6, and possibly earlier versions, allows remote attackers to execute arbitrary web script or HTML via square brackets at the beginning and end of (1) computed for display, (2) computed when composed, or (3) computed text element fields. NOTE: the vendor has disputed this issue, saying that it is not a problem with Notes/Domino itself, but with the applications that do not properly handle this feature.", "id": "GSD-2004-1621" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-1621" ], "details": "** DISPUTED ** NOTE: this issue has been disputed by the vendor. Cross-site scripting (XSS) vulnerability in IBM Lotus Notes R6 and Domino R6, and possibly earlier versions, allows remote attackers to execute arbitrary web script or HTML via square brackets at the beginning and end of (1) computed for display, (2) computed when composed, or (3) computed text element fields. NOTE: the vendor has disputed this issue, saying that it is not a problem with Notes/Domino itself, but with the applications that do not properly handle this feature.", "id": "GSD-2004-1621", "modified": "2023-12-13T01:22:55.820815Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1621", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** NOTE: this issue has been disputed by the vendor. Cross-site scripting (XSS) vulnerability in IBM Lotus Notes R6 and Domino R6, and possibly earlier versions, allows remote attackers to execute arbitrary web script or HTML via square brackets at the beginning and end of (1) computed for display, (2) computed when composed, or (3) computed text element fields. NOTE: the vendor has disputed this issue, saying that it is not a problem with Notes/Domino itself, but with the applications that do not properly handle this feature." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#404382", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/404382" }, { "name": "lotus-notes-xss(17758)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17758" }, { "name": "20041021 Re: IBM Lotus Notes/Domino fails to encode Square Brackets ( [ ] )", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109841682529328\u0026w=2" }, { "name": "12891", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12891" }, { "name": "11458", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11458" }, { "name": "20041018 IBM Lotus Notes/Domino fails to encode Square Brackets ( [ ] )", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109812960023736\u0026w=2" }, { "name": "1011779", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1011779" }, { "name": "http://www-1.ibm.com/support/docview.wss?rs=463\u0026uid=swg21187833", "refsource": "MISC", "url": "http://www-1.ibm.com/support/docview.wss?rs=463\u0026uid=swg21187833" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9989FEB-3B5E-40FF-BDBF-CFC835BCF93B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B4B2AFF7-3921-402A-AE7A-BB9E2E8AA0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1320064-F0E9-42C8-8E1C-9037684FA693", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.2_cf2:*:*:*:*:*:*:*", "matchCriteriaId": "64AB8494-6BC9-43CB-A645-43944B03D10A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "06DBE88F-F765-448E-88AF-3ED9FB98181A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "0766C3F9-D2A2-4A58-9FF7-11B57232DEA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "C00B8057-26DF-4064-A934-0AA88A0C1A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "8EFA5487-2D61-4E61-98A3-51882A8CE0C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "NOTE: this issue has been disputed by the vendor. Cross-site scripting (XSS) vulnerability in IBM Lotus Notes R6 and Domino R6, and possibly earlier versions, allows remote attackers to execute arbitrary web script or HTML via square brackets at the beginning and end of (1) computed for display, (2) computed when composed, or (3) computed text element fields. NOTE: the vendor has disputed this issue, saying that it is not a problem with Notes/Domino itself, but with the applications that do not properly handle this feature" } ], "id": "CVE-2004-1621", "lastModified": "2024-04-11T00:38:21.793", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-18T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109812960023736\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109841682529328\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/advisories/12891" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1011779" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=463\u0026uid=swg21187833" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/404382" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11458" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17758" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.