Lucene search

K
freebsdFreeBSD88760F4D-8EF7-11EA-A66D-4B2EF158BE83
HistoryApr 20, 2020 - 12:00 a.m.

mailman -- arbitrary content injection vulnerability via options or private archive login pages

2020-04-2000:00:00
vuxml.freebsd.org
17

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

52.0%

Mark Sapiro reports:

A content injection vulnerability via the options login page has
been discovered and reported by Vishal Singh.

    An issue similar to CVE-2018-13796 exists at different endpoint & param. It can lead to a phishing attack.
  



    (added 2020-05-07) This is essentially the same as
    https://bugs.launchpad.net/mailman/+bug/1873722 except the vector is
    the private archive login page and the attack only succeeds if the
    list's roster visibility (private_roster) setting is 'Anyone'.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchmailman< 2.1.30_4UNKNOWN
FreeBSDanynoarchmailman-with-htdig< 2.1.30_4UNKNOWN

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

52.0%