Vulnerability CVE-2006-4624


Published: 2006-09-07   Modified: 2012-02-12

Description:
CRLF injection vulnerability in Utils.py in Mailman before 2.1.9rc1 allows remote attackers to spoof messages in the error log and possibly trick the administrator into visiting malicious URLs via CRLF sequences in the URI.

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:H/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.6/10
2.9/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
GNU -> Mailman 

 References:
http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html
http://moritz-naumann.com/adv/0013/mailmanmulti/0013.txt
http://security.gentoo.org/glsa/glsa-200609-12.xml
http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295
http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923
http://www.debian.org/security/2006/dsa-1188
http://www.mandriva.com/security/advisories?name=MDKSA-2006:165
http://www.novell.com/linux/security/advisories/2006_25_sr.html
http://www.redhat.com/support/errata/RHSA-2007-0779.html
http://www.securityfocus.com/archive/1/445992/100/0/threaded
http://www.securityfocus.com/bid/19831
http://www.securityfocus.com/bid/20021
http://www.vupen.com/english/advisories/2006/3446
https://exchange.xforce.ibmcloud.com/vulnerabilities/28734
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9756

Copyright 2024, cxsecurity.com

 

Back to Top