2024-05-13
ALT-BU-2024-7730-1
Branch p10_e2k update bulletin.
Closed vulnerabilities
Published: 2021-12-03
BDU:2022-00592
Уязвимость пакета управления рассылками электронных писем GNU Mailman, связанная с недостаточной проверкой источника HTTP-запроса, позволяющая нарушителю выполнять атаки с подделкой межсайтовых запросов
Severity: MEDIUM (6.1)
Vector: AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
References:
Published: 2021-10-21
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-42097
GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).
Severity: HIGH (8.0)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
References:
- [oss-security] 20211021 Mailman 2.1.35 security release
- [oss-security] 20211021 Mailman 2.1.35 security release
- https://bugs.launchpad.net/mailman/+bug/1947640
- https://bugs.launchpad.net/mailman/+bug/1947640
- https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/
- https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/
- DSA-4991
- DSA-4991
Published: 2021-12-02
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-44227
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
Severity: HIGH (8.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
References: