Lucene search

K
freebsdFreeBSD4AB29E12-E787-11DF-ADFA-00E0815B8DA8
HistorySep 14, 2010 - 12:00 a.m.

Mailman -- cross-site scripting in web interface

2010-09-1400:00:00
vuxml.freebsd.org
18

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

EPSS

0.002

Percentile

53.0%

Secunia reports:

Two vulnerabilities have been reported in Mailman, which
can be exploited by malicious users to conduct script
insertion attacks.
Certain input passed via the list descriptions is not
properly sanitised before being displayed to the user. This
can be exploited to insert arbitrary HTML and script code,
which will be executed in a user’s browser session in context
of an affected site when the malicious data is being
viewed.
Successful exploitation requires “list owner” permissions.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchmailman< 2.1.14UNKNOWN

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

EPSS

0.002

Percentile

53.0%