An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty prior to 1.3.5. When importing a private mailing list’s archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
CPE | Name | Operator | Version |
---|---|---|---|
hyperkitty | eq | 1.3.4 | |
hyperkitty | eq | 0.1.7 | |
hyperkitty | eq | 1.3.4rc2 | |
hyperkitty | eq | 0.1 | |
hyperkitty | eq | 1.3.4rc1 | |
hyperkitty | eq | 1.3.3 | |
hyperkitty | eq | 1.3.3rc2 | |
hyperkitty | eq | 0.1.4 | |
hyperkitty | eq | 1.2.0a1 | |
hyperkitty | eq | 1.1.4 |
gitlab.com/mailman/hyperkitty
gitlab.com/mailman/hyperkitty/-/blob/master/doc/news.rst#L83-L87
gitlab.com/mailman/hyperkitty/-/commit/9025324597d60b2dff740e49b70b15589d6804fa
gitlab.com/mailman/hyperkitty/-/issues/380
nvd.nist.gov/vuln/detail/CVE-2021-33038
techblog.wikimedia.org/2021/06/11/discovering-and-fixing-cve-2021-33038-in-mailman3
www.debian.org/security/2021/dsa-4922