SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   Mailman Vendors:   GNU [multiple authors]
(Fedora Issues Fix) Mailman Input Validation Flaw in Admin Pages Permit Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1010201
SecurityTracker URL:  http://securitytracker.com/id/1010201
CVE Reference:   CVE-2003-0965   (Links to External Site)
Date:  May 18 2004
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 2.1.4-1
Description:   An input validation vulnerability was reported in Mailman. A remote user can conduct cross-site scripting attacks.

In December 2003, it was reported it was reported that the admin pages permit cross-site scripting attacks. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Mailman software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Mailman software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   Fedora has released a fix, available at:

http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

4b8e7161d1a2bb7f912efd294775b887 SRPMS/mailman-2.1.4-1.src.rpm
6e387ba96c1d651a55b329b0ab678824 i386/mailman-2.1.4-1.i386.rpm
60c4f5f77c01e8521c8079f00fadf1e8 i386/debug/mailman-debuginfo-2.1.4-1.i386.rpm
c823903d2b33ce9ff794f5ba3c9d514d x86_64/mailman-2.1.4-1.x86_64.rpm
15a0c4d8f8069395602a40ee121eff0a x86_64/debug/mailman-debuginfo-2.1.4-1.x86_64.rpm

Vendor URL:  www.gnu.org/software/mailman/mailman.html (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Red Hat Fedora)

Message History:   This archive entry is a follow-up to the message listed below.
Feb 6 2004 Mailman Input Validation Flaw in Admin Pages Permit Cross-Site Scripting Attacks



 Source Message Contents

Subject:  [SECURITY] Fedora Core 1 Update: mailman-2.1.4-1


---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2004-060
2004-02-26
---------------------------------------------------------------------

Name        : mailman
Version     : 2.1.4                      
Release     : 1                  
Summary     : Mailing list manager with built in Web access.
Description :
Mailman is software to help manage email discussion lists, much like
Majordomo and Smartmail. Unlike most similar products, Mailman gives
each mailing list a webpage, and allows users to subscribe,
unsubscribe, etc. over the Web. Even the list manager can administer
his or her list entirely from the Web. Mailman also integrates most
things people want to do with mailing lists, including archiving, mail
<-> news gateways, and so on.

Documentation can be found in: /usr/share/doc/mailman-2.1.4

When the package has finished installing, you will need to perform some
additional installation steps, these are described in:
/usr/share/doc/mailman-2.1.4/INSTALL.REDHAT

---------------------------------------------------------------------
Update Information:

A cross-site scripting (XSS) vulnerability exists in the admin CGI
script for Mailman before 2.1.4.  This update moves Mailman to version
2.1.4 which is not vulnerable to this issue.

Updated packages were made available in February 2004 however the original
update notification email did not make it to fedora-announce-list at
that time.

---------------------------------------------------------------------

* Fri Jan 09 2004 John Dennis <jdennis@finch.boston.redhat.com> 3:2.1.4-1

- upgrade to new upstream release 2.1.4
- fixes bugs 106349,112851,105367,91463


---------------------------------------------------------------------
This update can be downloaded from:
  http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

4b8e7161d1a2bb7f912efd294775b887  SRPMS/mailman-2.1.4-1.src.rpm
6e387ba96c1d651a55b329b0ab678824  i386/mailman-2.1.4-1.i386.rpm
60c4f5f77c01e8521c8079f00fadf1e8  i386/debug/mailman-debuginfo-2.1.4-1.i386.rpm
c823903d2b33ce9ff794f5ba3c9d514d  x86_64/mailman-2.1.4-1.x86_64.rpm
15a0c4d8f8069395602a40ee121eff0a  x86_64/debug/mailman-debuginfo-2.1.4-1.x86_64.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the 'up2date' command.  
---------------------------------------------------------------------


--
fedora-announce-list mailing list
fedora-announce-list@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-announce-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC