Mailman Admin Pages XSS

2004-01-01T07:23:58
ID OSVDB:3305
Type osvdb
Reporter OSVDB
Modified 2004-01-01T07:23:58

Description

Vulnerability Description

Mailman contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user supplied input upon submission to the admin scripts. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 2.1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Mailman contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user supplied input upon submission to the admin scripts. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.list.org/ Secunia Advisory ID:10519 OVAL ID: 813 Nessus Plugin ID:12570 ISS X-Force ID: 14121 Generic Informational URL: http://cvs.sourceforge.net/viewcvs.py/checkout/mailman/mailman/NEWS?content-type=text%2Fplain&rev=2.43.2.18 CVE-2003-0965 Bugtraq ID: 9336