mailman 2.1.13 xss

2010.09.17
Credit: vendor
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 3.5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 6.8/10
Exploit range: Remote
Attack complexity: Medium
Authentication: Single time
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

I plan to release a Mailman 2.1.14 candidate release towards the end of next week (Sept 9 or 10). This release will have enhanced XSS defenses addressing two recently discovered vulnerabilities. Since release of the code will potentially expose the vulnerabilities, I plan to publish a patch against the 2.1.13 base with the fix before actually releasing the 2.1.14 candidate. I will post the patch to the same 4 lists that this post is being sent to in the early afternoon, GMT, on September 9. The vulnerabilities are obscure and can only be exploited by a list owner, but if you are concerned about them you can plan to install the patch. The patch is small (34 line diff), only affects two modules and doesn't require a Mailman restart to be effective, although I would recommend a restart as soon as convenient after applying the patch. - -- Mark Sapiro <mark at msapiro.net> The highway is for gamblers, San Francisco Bay Area, California better use your sense - B. Dylan

References:

https://launchpad.net/mailman/+milestone/2.1.14rc1
https://bugzilla.redhat.com/show_bug.cgi?id=631881
https://bugzilla.redhat.com/show_bug.cgi?id=631859
http://secunia.com/advisories/41265
http://marc.info/?l=oss-security&m=128441369020123&w=2
http://marc.info/?l=oss-security&m=128441237618793&w=2
http://marc.info/?l=oss-security&m=128441135117819&w=2
http://marc.info/?l=oss-security&m=128440851513718&w=2
http://marc.info/?l=oss-security&m=128438736513097&w=2
http://mail.python.org/pipermail/mailman-announce/2010-September/000151.html
http://mail.python.org/pipermail/mailman-announce/2010-September/000150.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top