8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
64.5%
Issue Overview:
Cross-site scripting (XSS) vulnerability in web UI
A cross-site scripting (XSS) flaw was found in mailman. An attacker, able to trick the user into visiting a specific URL, can execute arbitrary web scripts on the user’s side and force the victim to perform unintended actions. (CVE-2018-5950)
CSRF protection missing in the user options page
Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim’s account. (CVE-2016-6893)
Affected Packages:
mailman
Issue Correction:
Run yum update mailman to update your system.
New Packages:
i686:
mailman-2.1.15-26.21.amzn1.i686
mailman-debuginfo-2.1.15-26.21.amzn1.i686
src:
mailman-2.1.15-26.21.amzn1.src
x86_64:
mailman-2.1.15-26.21.amzn1.x86_64
mailman-debuginfo-2.1.15-26.21.amzn1.x86_64
Red Hat: CVE-2016-6893, CVE-2018-5950
Mitre: CVE-2016-6893, CVE-2018-5950
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | mailman | < 2.1.15-26.21.amzn1 | mailman-2.1.15-26.21.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mailman-debuginfo | < 2.1.15-26.21.amzn1 | mailman-debuginfo-2.1.15-26.21.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | mailman | < 2.1.15-26.21.amzn1 | mailman-2.1.15-26.21.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | mailman-debuginfo | < 2.1.15-26.21.amzn1 | mailman-debuginfo-2.1.15-26.21.amzn1.x86_64.rpm |
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
64.5%