Lucene search

K
gentooGentoo FoundationGLSA-200502-11
HistoryFeb 10, 2005 - 12:00 a.m.

Mailman: Directory traversal vulnerability

2005-02-1000:00:00
Gentoo Foundation
security.gentoo.org
13

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.008 Low

EPSS

Percentile

82.3%

Background

Mailman is a Python-based mailing list server with an extensive web interface.

Description

Mailman contains an error in private.py which fails to properly sanitize input paths.

Impact

An attacker could exploit this flaw to obtain arbitrary files on the web server.

Workaround

There is no known workaround at this time.

Resolution

All Mailman users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-mail/mailman-2.1.5-r4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-mail/mailman< 2.1.5-r4UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.008 Low

EPSS

Percentile

82.3%