ALT-PU-2021-4616-1
Closed vulnerabilities
BDU:2021-06194
Уязвимость параметров cgi/options.pyв пакета для управления рассылками электронных писем GNU Mailman, связанная с непринятием мер по защите структуры веб-страницы, позволяющая выполнить произвольный JavaScript-код
BDU:2021-06195
Уязвимость пакета для управления рассылками электронных писем GNU Mailman, связанная с недостаточным ограничением попыток аутентификации, позволяющая пользователю обойти процедуру аутентификации
Modified: 2024-11-21
CVE-2021-42096
GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password.
- [oss-security] 20211021 Mailman 2.1.35 security release
- [oss-security] 20211021 Mailman 2.1.35 security release
- https://bugs.launchpad.net/mailman/+bug/1947639
- https://bugs.launchpad.net/mailman/+bug/1947639
- https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/
- https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/
- DSA-4991
- DSA-4991
Modified: 2024-11-21
CVE-2021-42097
GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).
- [oss-security] 20211021 Mailman 2.1.35 security release
- [oss-security] 20211021 Mailman 2.1.35 security release
- https://bugs.launchpad.net/mailman/+bug/1947640
- https://bugs.launchpad.net/mailman/+bug/1947640
- https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/
- https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/
- DSA-4991
- DSA-4991
Modified: 2024-11-21
CVE-2021-43331
In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.
- https://bugs.launchpad.net/mailman/+bug/1949401
- https://bugs.launchpad.net/mailman/+bug/1949401
- [debian-lts-announce] 20220609 [SECURITY] [DLA 3049-1] mailman security update
- [debian-lts-announce] 20220609 [SECURITY] [DLA 3049-1] mailman security update
- https://mail.python.org/archives/list/mailman-announce%40python.org/message/I2X7PSFXIEPLM3UMKZMGOEO3UFYETGRL/
- https://mail.python.org/archives/list/mailman-announce%40python.org/message/I2X7PSFXIEPLM3UMKZMGOEO3UFYETGRL/
Modified: 2024-11-21
CVE-2021-43332
In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack.
- https://bugs.launchpad.net/mailman/+bug/1949403
- https://bugs.launchpad.net/mailman/+bug/1949403
- [debian-lts-announce] 20220609 [SECURITY] [DLA 3049-1] mailman security update
- [debian-lts-announce] 20220609 [SECURITY] [DLA 3049-1] mailman security update
- https://mail.python.org/archives/list/mailman-announce%40python.org/message/I2X7PSFXIEPLM3UMKZMGOEO3UFYETGRL/
- https://mail.python.org/archives/list/mailman-announce%40python.org/message/I2X7PSFXIEPLM3UMKZMGOEO3UFYETGRL/