Summary
Detail | |||
---|---|---|---|
Vendor | Sympa | First view | 2004-08-21 |
Product | Sympa | Last view | 2023-12-31 |
Version | 4.1 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:sympa:sympa |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2023-12-31 | CVE-2021-46900 | Sympa before 6.2.62 relies on a cookie parameter for certain security objectives, but does not ensure that this parameter exists and has an unpredictable value. Specifically, the cookie parameter is both a salt for stored passwords and an XSS protection mechanism. |
3.7 | 2020-12-10 | CVE-2020-29668 | Sympa before 6.2.59b.2 allows remote attackers to obtain full SOAP API access by sending any arbitrary string (except one from an expired cookie) as the cookie value to authenticateAndRun. |
4.3 | 2020-10-10 | CVE-2020-26932 | debian/sympa.postinst for the Debian Sympa package before 6.2.40~dfsg-7 uses mode 4755 for sympa_newaliases-wrapper, whereas the intended permissions are mode 4750 (for access by the sympa group) |
7.8 | 2020-10-07 | CVE-2020-26880 | Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable. |
7.8 | 2020-05-27 | CVE-2020-10936 | Sympa before 6.2.56 allows privilege escalation. |
7.5 | 2020-02-24 | CVE-2020-9369 | Sympa 6.2.38 through 6.2.52 allows remote attackers to cause a denial of service (disk consumption from temporary files, and a flood of notifications to listmasters) via a series of requests with malformed parameters. |
9.8 | 2018-06-26 | CVE-2018-1000550 | The Sympa Community Sympa version prior to version 6.2.32 contains a Directory Traversal vulnerability in wwsympa.fcgi template editing function that can result in Possibility to create or modify files on the server filesystem. This attack appear to be exploitable via HTTP GET/POST request. This vulnerability appears to have been fixed in 6.2.32. |
7.5 | 2012-05-31 | CVE-2012-2352 | The archive management (arc_manage) page in wwsympa/wwsympa.fcgi.in in Sympa before 6.1.11 does not check permissions, which allows remote attackers to list, read, and delete arbitrary list archives via vectors related to the (1) do_arc_manage, (2) do_arc_download, or (3) do_arc_delete functions. |
5 | 2008-04-02 | CVE-2008-1648 | Sympa before 5.4 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message with a malformed value of the Content-Type header and unspecified other headers. NOTE: some of these details are obtained from third party information. |
4.3 | 2004-08-21 | CVE-2004-1735 | Cross-site scripting (XSS) vulnerability in the create list option in Sympa 4.1.x and earlier allows remote authenticated users to inject arbitrary web script or HTML via the description field. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
20% (2) | CWE-269 | Improper Privilege Management |
10% (1) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
10% (1) | CWE-565 | Reliance on Cookies without Validation and Integrity Checking |
10% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
10% (1) | CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
10% (1) | CWE-287 | Improper Authentication |
10% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
10% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
10% (1) | CWE-20 | Improper Input Validation |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
43981 | Sympa Malformed Content-Type Header Handling Remote DoS |
9081 | Sympa List Creation Description Field XSS |
OpenVAS Exploits
id | Description |
---|---|
2012-05-31 | Name : Debian Security Advisory DSA 2477-1 (sympa) File : nvt/deb_2477_1.nasl |
2012-05-31 | Name : FreeBSD Ports: sympa File : nvt/freebsd_sympa0.nasl |
2008-10-24 | Name : Sympa New List Cross-Site Scripting Vulnerability File : nvt/sympa_new_list_xss.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-09-06 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4285.nasl - Type: ACT_GATHER_INFO |
2018-07-25 | Name: The remote Debian host is missing a security update. File: debian_DLA-1441.nasl - Type: ACT_GATHER_INFO |
2012-05-22 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-2477.nasl - Type: ACT_GATHER_INFO |
2012-05-22 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_78c39232a34511e19d81d0df9acfd7e5.nasl - Type: ACT_GATHER_INFO |
2008-07-08 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-1600.nasl - Type: ACT_GATHER_INFO |
2008-04-01 | Name: The remote web server contains a Perl script that is prone to a denial of ser... File: sympa_5_4.nasl - Type: ACT_GATHER_INFO |
2004-08-22 | Name: The remote web server contains a CGI script that is affected by a cross-site ... File: sympa_new_list_xss.nasl - Type: ACT_GATHER_INFO |