ALT-PU-2021-3235-1
Closed vulnerabilities
Published: 2021-10-21
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-42096
GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password.
Severity: MEDIUM (4.3)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
References:
- [oss-security] 20211021 Mailman 2.1.35 security release
- [oss-security] 20211021 Mailman 2.1.35 security release
- https://bugs.launchpad.net/mailman/+bug/1947639
- https://bugs.launchpad.net/mailman/+bug/1947639
- https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/
- https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/
- DSA-4991
- DSA-4991
Published: 2021-10-21
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-42097
GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).
Severity: HIGH (8.0)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
References:
- [oss-security] 20211021 Mailman 2.1.35 security release
- [oss-security] 20211021 Mailman 2.1.35 security release
- https://bugs.launchpad.net/mailman/+bug/1947640
- https://bugs.launchpad.net/mailman/+bug/1947640
- https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/
- https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/
- DSA-4991
- DSA-4991