{"vuid":"VU#636431","idnumber":"636431","name":"Verity's Search97 contains a Cross-Site Scripting vulnerability in the processing of search requests","keywords":["s97","s97.exe","s97.cgi","search97","search","97","verity"],"overview":"Verity's Search97 application contains a Cross-Site Scripting vulnerability in the processing of search requests.","clean_desc":"Verity's Search97 application contains a Cross-Site Scripting vulnerability in the processing of search requests. This vulnerability is in both the Microsoft Window's and UNIX versions of the product. More information about Cross-Site Scripting can be found in CA-2000-02. It appears that the fault lies in the error pages returned from templates and actions that use either vformat() or vfilter().","impact":"The victim will be presented with information which the compromised site did not wish their visitors to be subjected. This could be used to \"sniff\" sensitive data from within the web page, including passwords, credit card numbers, and any arbitrary information the user inputs. Likewise, information stored in cookies can be stolen or corrupted.","resolution":"According to Verity, this issue is resolved by appling the patch IS37patch18_nti40.zip available to customers at  https://customers.verity.com.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Point Blank Security.","author":"This document was written by Jason Rafail.","public":["h","t","t","p",":","/","/","w","w","w",".","p","o","i","n","t","b","l","a","n","k","s","e","c","u","r","i","t","y",".","c","o","m","/","c","s","s","/"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-04-29T15:29:26Z","publicdate":"2002-03-19T00:00:00Z","datefirstpublished":"2002-06-21T14:40:17Z","dateupdated":"2002-06-21T14:40:23Z","revision":7,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"5","cam_impact":"8","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.5","cam_scorecurrentwidelyknown":"4.5","cam_scorecurrentwidelyknownexploited":"8.1","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.5,"vulnote":null}