Lucene search

K
ubuntuUbuntuUSN-5121-2
HistoryNov 01, 2021 - 12:00 a.m.

Mailman vulnerabilities

2021-11-0100:00:00
ubuntu.com
64

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.015 Low

EPSS

Percentile

86.4%

Releases

  • Ubuntu 20.04 LTS

Packages

  • mailman - Web-based mailing list manager

Details

USN-5009-1 fixed vulnerabilities in Mailman. This update provides the
corresponding updates for Ubuntu 20.04 LTS. In addition, the following CVEs
were fixed:

It was discovered that Mailman allows arbitrary content injection. An attacker
could use this to inject malicious content. (CVE-2020-12108, CVE-2020-15011)

It was discovered that Mailman improperly sanitize the MIME content. An
attacker could obtain sensitive information by sending a special type of
attachment. (CVE-2020-12137)

Original advisory details:

Andre Protas, Richard Cloke, and Andy Nuttall discovered that Mailman
did not properly associate cross-site request forgery (CSRF) tokens
to specific accounts. A remote attacker could use this to perform a
CSRF attack to gain access to another account. (CVE-2021-42097)

Andre Protas, Richard Cloke, and Andy Nuttall discovered that Mailman’s
cross-site request forgery (CSRF) tokens for the options page are
derived from the admin password. A remote attacker could possibly use
this to assist in performing a brute force attack against the admin
password. (CVE-2021-42096)

OSVersionArchitecturePackageVersionFilename
Ubuntu20.04noarchmailman< 1:2.1.29-1ubuntu3.1UNKNOWN
Ubuntu20.04noarchmailman-dbgsym< 1:2.1.29-1ubuntu3.1UNKNOWN

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.015 Low

EPSS

Percentile

86.4%