ALT-PU-2021-2340-1
Closed vulnerabilities
BDU:2020-03224
Уязвимость страницы входа в личный архив Cgi/private.py системы управления почтовыми рассылками GNU Mailman, позволяющая нарушителю внедрить произвольный контент
BDU:2020-03997
Уязвимость программного обеспечения для управления рассылками электронных писем Mailman, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2020-12108
/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
- openSUSE-SU-2020:0661
- openSUSE-SU-2020:0764
- openSUSE-SU-2020:1707
- openSUSE-SU-2020:1752
- https://bugs.launchpad.net/mailman/+bug/1873722
- https://code.launchpad.net/mailman
- [debian-lts-announce] 20200507 [SECURITY] [DLA 2204-1] mailman security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2276-1] mailman security update
- FEDORA-2020-62f2df3ca4
- https://mail.python.org/pipermail/mailman-announce/
- USN-4354-1
- DSA-4991
- openSUSE-SU-2020:0661
- DSA-4991
- USN-4354-1
- https://mail.python.org/pipermail/mailman-announce/
- FEDORA-2020-62f2df3ca4
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2276-1] mailman security update
- [debian-lts-announce] 20200507 [SECURITY] [DLA 2204-1] mailman security update
- https://code.launchpad.net/mailman
- https://bugs.launchpad.net/mailman/+bug/1873722
- openSUSE-SU-2020:1752
- openSUSE-SU-2020:1707
- openSUSE-SU-2020:0764
Modified: 2024-11-21
CVE-2020-12137
GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code.
- http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/head:/NEWS
- openSUSE-SU-2020:1707
- openSUSE-SU-2020:1752
- [oss-security] 20200424 Re: mailman 2.x: XSS via file attachments in list archives
- [debian-lts-announce] 20200503 [SECURITY] [DLA 2200-1] mailman security update
- FEDORA-2020-20b748e81e
- FEDORA-2020-69f2f1d987
- USN-4348-1
- DSA-4664
- https://www.openwall.com/lists/oss-security/2020/02/24/2
- https://www.openwall.com/lists/oss-security/2020/02/24/3
- http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/head:/NEWS
- https://www.openwall.com/lists/oss-security/2020/02/24/3
- https://www.openwall.com/lists/oss-security/2020/02/24/2
- DSA-4664
- USN-4348-1
- FEDORA-2020-69f2f1d987
- FEDORA-2020-20b748e81e
- [debian-lts-announce] 20200503 [SECURITY] [DLA 2200-1] mailman security update
- [oss-security] 20200424 Re: mailman 2.x: XSS via file attachments in list archives
- openSUSE-SU-2020:1752
- openSUSE-SU-2020:1707
Modified: 2024-11-21
CVE-2020-15011
GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.
- openSUSE-SU-2020:1707
- openSUSE-SU-2020:1707
- openSUSE-SU-2020:1752
- openSUSE-SU-2020:1752
- https://bugs.launchpad.net/mailman/+bug/1877379
- https://bugs.launchpad.net/mailman/+bug/1877379
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2265-1] mailman security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2265-1] mailman security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2276-1] mailman security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2276-1] mailman security update
- USN-4406-1
- USN-4406-1
- DSA-4991
- DSA-4991
Closed bugs
MAILMAN_SITE_LIST = None breaks initial setup