This CPE summary could be partial or incomplete. Please contact us for a detailed listing.


Vendor Sympa First view 2004-08-21
Product Sympa Last view 2020-12-10
Version Type Application
Sofware Edition  
Target Software  
Target Hardware  

Activity : Overall


CPE Name Affected CVE
cpe:2.3:a:sympa:sympa:4.0:*:*:*:*:*:*:* 9
cpe:2.3:a:sympa:sympa:4.1:*:*:*:*:*:*:* 9
cpe:2.3:a:sympa:sympa:3.1:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:4.0.b1:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:2.2.5:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:3.1b.13:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:3.3b.4:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:4.2b.1:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:4.0.a1:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:5.3a.9:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:5.4a.2:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:3.0b.4:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:5.3b.4:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:1.3.4-1:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:3.3.6b.2:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:2.7b.3:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:2.5.3b:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:2.7.1:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:2.3.1:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:3.2.1:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:4.0.a8:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:2.7a:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:3.0b.9:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:2.2.2b:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:3.1b.7:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:3.3.6b.6:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:5.3a.10:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:2.2.3b:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:5.2:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:1.3.4:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:3.1b.9:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:4.2b.3:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:1.3.1-2:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:3.0a.1:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:3.3.6b.4:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:1.5:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:5.3b.3:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:5.4a.4:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:5.0:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:2.7b.2:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:3.3.4b.6:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:2.7:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:4.0.a5:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:1.3.0:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:5.0b:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:2.3beta:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:0.010:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:1.2.0:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:1.3.2:*:*:*:*:*:*:* 8
cpe:2.3:a:sympa:sympa:1.3.1:*:*:*:*:*:*:* 8

Related : CVE

  Date Alert Description
3.7 2020-12-10 CVE-2020-29668

Sympa before 6.2.59b.2 allows remote attackers to obtain full SOAP API access by sending any arbitrary string (except one from an expired cookie) as the cookie value to authenticateAndRun.

4.3 2020-10-10 CVE-2020-26932

debian/sympa.postinst for the Debian Sympa package before 6.2.40~dfsg-7 uses mode 4755 for sympa_newaliases-wrapper, whereas the intended permissions are mode 4750 (for access by the sympa group)

7.8 2020-10-07 CVE-2020-26880

Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable.

7.8 2020-05-27 CVE-2020-10936

Sympa before 6.2.56 allows privilege escalation.

7.5 2020-02-24 CVE-2020-9369

Sympa 6.2.38 through 6.2.52 allows remote attackers to cause a denial of service (disk consumption from temporary files, and a flood of notifications to listmasters) via a series of requests with malformed parameters.

6.1 2018-09-06 CVE-2018-1000671

sympa version 6.2.16 and later contains a CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability in The "referer" parameter of the wwsympa.fcgi login action. that can result in Open redirection and reflected XSS via data URIs. This attack appear to be exploitable via Victim's browser must follow a URL supplied by the attacker. This vulnerability appears to have been fixed in none available.

9.8 2018-06-26 CVE-2018-1000550

The Sympa Community Sympa version prior to version 6.2.32 contains a Directory Traversal vulnerability in wwsympa.fcgi template editing function that can result in Possibility to create or modify files on the server filesystem. This attack appear to be exploitable via HTTP GET/POST request. This vulnerability appears to have been fixed in 6.2.32.

5 2015-01-22 CVE-2015-1306

The newsletter posting area in the web interface in Sympa 6.0.x before 6.0.10 and 6.1.x before 6.1.24 allows remote attackers to read arbitrary files via unspecified vectors.

7.5 2012-05-31 CVE-2012-2352

The archive management (arc_manage) page in wwsympa/ in Sympa before 6.1.11 does not check permissions, which allows remote attackers to list, read, and delete arbitrary list archives via vectors related to the (1) do_arc_manage, (2) do_arc_download, or (3) do_arc_delete functions.

6.9 2008-10-07 CVE-2008-4476 in sympa 5.3.4 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/sympa_aliases.$$ temporary file. NOTE: wwsympa.fcgi was also reported, but the issue occurred in a dead function, so it is not a vulnerability.

5 2008-04-02 CVE-2008-1648

Sympa before 5.4 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message with a malformed value of the Content-Type header and unspecified other headers. NOTE: some of these details are obtained from third party information.

4.3 2004-08-21 CVE-2004-1735

Cross-site scripting (XSS) vulnerability in the create list option in Sympa 4.1.x and earlier allows remote authenticated users to inject arbitrary web script or HTML via the description field.

CWE : Common Weakness Enumeration

16% (2) CWE-269 Improper Privilege Management
8% (1) CWE-732 Incorrect Permission Assignment for Critical Resource
8% (1) CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
8% (1) CWE-565 Reliance on Cookies without Validation and Integrity Checking
8% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
8% (1) CWE-287 Improper Authentication
8% (1) CWE-264 Permissions, Privileges, and Access Controls
8% (1) CWE-200 Information Exposure
8% (1) CWE-59 Improper Link Resolution Before File Access ('Link Following')
8% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
8% (1) CWE-20 Improper Input Validation

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:8082 DSA-1600 sympa -- dos
oval:org.mitre.oval:def:18573 DSA-1600-1 sympa - denial of service
oval:org.mitre.oval:def:18542 DSA-2477-1 sympa - authorisation bypass

Open Source Vulnerability Database (OSVDB)

id Description
47550 Sympa Symlink Arbitrary File Manipulation
43981 Sympa Malformed Content-Type Header Handling Remote DoS
9081 Sympa List Creation Description Field XSS

OpenVAS Exploits

id Description
2012-05-31 Name : Debian Security Advisory DSA 2477-1 (sympa)
File : nvt/deb_2477_1.nasl
2012-05-31 Name : FreeBSD Ports: sympa
File : nvt/freebsd_sympa0.nasl
2009-10-19 Name : Mandrake Security Advisory MDVSA-2009:263 (sympa)
File : nvt/mdksa_2009_263.nasl
2009-10-11 Name : Sympa '' Insecure Temporary File Creation Vulnerability
File : nvt/sympa_30727.nasl
2008-10-24 Name : Sympa New List Cross-Site Scripting Vulnerability
File : nvt/sympa_new_list_xss.nasl

Nessus® Vulnerability Scanner

id Description
2018-09-21 Name: The remote Debian host is missing a security update.
File: debian_DLA-1512.nasl - Type: ACT_GATHER_INFO
2018-09-06 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4285.nasl - Type: ACT_GATHER_INFO
2018-07-25 Name: The remote Debian host is missing a security update.
File: debian_DLA-1441.nasl - Type: ACT_GATHER_INFO
2015-03-26 Name: The remote Debian host is missing a security update.
File: debian_DLA-148.nasl - Type: ACT_GATHER_INFO
2015-03-19 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-051.nasl - Type: ACT_GATHER_INFO
2015-03-13 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_451a6c79c92b11e4a835000c292ee6b8.nasl - Type: ACT_GATHER_INFO
2015-01-21 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3134.nasl - Type: ACT_GATHER_INFO
2012-05-22 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-2477.nasl - Type: ACT_GATHER_INFO
2012-05-22 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_78c39232a34511e19d81d0df9acfd7e5.nasl - Type: ACT_GATHER_INFO
2009-10-12 Name: The remote Mandriva Linux host is missing a security update.
File: mandriva_MDVSA-2009-263.nasl - Type: ACT_GATHER_INFO
2008-07-08 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-1600.nasl - Type: ACT_GATHER_INFO
2008-04-01 Name: The remote web server contains a Perl script that is prone to a denial of ser...
File: sympa_5_4.nasl - Type: ACT_GATHER_INFO
2004-08-22 Name: The remote web server contains a CGI script that is affected by a cross-site ...
File: sympa_new_list_xss.nasl - Type: ACT_GATHER_INFO