This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Sympa First view 2015-01-22
Product Sympa Last view 2023-12-31
Version 6.1.18 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:sympa:sympa

Activity : Overall

Related : CVE

  Date Alert Description
7.5 2023-12-31 CVE-2021-46900

Sympa before 6.2.62 relies on a cookie parameter for certain security objectives, but does not ensure that this parameter exists and has an unpredictable value. Specifically, the cookie parameter is both a salt for stored passwords and an XSS protection mechanism.

3.7 2020-12-10 CVE-2020-29668

Sympa before 6.2.59b.2 allows remote attackers to obtain full SOAP API access by sending any arbitrary string (except one from an expired cookie) as the cookie value to authenticateAndRun.

4.3 2020-10-10 CVE-2020-26932

debian/sympa.postinst for the Debian Sympa package before 6.2.40~dfsg-7 uses mode 4755 for sympa_newaliases-wrapper, whereas the intended permissions are mode 4750 (for access by the sympa group)

7.8 2020-10-07 CVE-2020-26880

Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable.

7.8 2020-05-27 CVE-2020-10936

Sympa before 6.2.56 allows privilege escalation.

7.5 2020-02-24 CVE-2020-9369

Sympa 6.2.38 through 6.2.52 allows remote attackers to cause a denial of service (disk consumption from temporary files, and a flood of notifications to listmasters) via a series of requests with malformed parameters.

9.8 2018-06-26 CVE-2018-1000550

The Sympa Community Sympa version prior to version 6.2.32 contains a Directory Traversal vulnerability in wwsympa.fcgi template editing function that can result in Possibility to create or modify files on the server filesystem. This attack appear to be exploitable via HTTP GET/POST request. This vulnerability appears to have been fixed in 6.2.32.

5 2015-01-22 CVE-2015-1306

The newsletter posting area in the web interface in Sympa 6.0.x before 6.0.10 and 6.1.x before 6.1.24 allows remote attackers to read arbitrary files via unspecified vectors.

CWE : Common Weakness Enumeration

%idName
22% (2) CWE-269 Improper Privilege Management
11% (1) CWE-732 Incorrect Permission Assignment for Critical Resource
11% (1) CWE-565 Reliance on Cookies without Validation and Integrity Checking
11% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
11% (1) CWE-327 Use of a Broken or Risky Cryptographic Algorithm
11% (1) CWE-287 Improper Authentication
11% (1) CWE-200 Information Exposure
11% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

Nessus® Vulnerability Scanner

id Description
2018-09-06 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4285.nasl - Type: ACT_GATHER_INFO
2018-07-25 Name: The remote Debian host is missing a security update.
File: debian_DLA-1441.nasl - Type: ACT_GATHER_INFO
2015-03-26 Name: The remote Debian host is missing a security update.
File: debian_DLA-148.nasl - Type: ACT_GATHER_INFO
2015-03-19 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-051.nasl - Type: ACT_GATHER_INFO
2015-03-13 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_451a6c79c92b11e4a835000c292ee6b8.nasl - Type: ACT_GATHER_INFO
2015-01-21 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3134.nasl - Type: ACT_GATHER_INFO