Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2011-0707 First vendor Publication 2011-02-22
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0707

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12397
 
Oval ID: oval:org.mitre.oval:def:12397
Title: DSA-2170-1 mailman -- several
Description: Two cross site scripting vulnerabilities were been discovered in Mailman, a web-based mailing list manager. These allowed an attacker to retreive session cookies via inserting crafted JavaScript into confirmation messages and in the list admin interface .
Family: unix Class: patch
Reference(s): DSA-2170-1
CVE-2010-3089
CVE-2011-0707
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): mailman
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13726
 
Oval ID: oval:org.mitre.oval:def:13726
Title: USN-1069-1 -- mailman vulnerabilities
Description: It was discovered that Mailman did not properly sanitize certain fields, resulting in cross-site scripting vulnerabilities. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain.
Family: unix Class: patch
Reference(s): USN-1069-1
CVE-2010-3089
CVE-2011-0707
Version: 5
Platform(s): Ubuntu 8.04
Ubuntu 10.10
Ubuntu 10.04
Ubuntu 9.10
Ubuntu 6.06
Product(s): mailman
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21661
 
Oval ID: oval:org.mitre.oval:def:21661
Title: RHSA-2011:0307: mailman security update (Moderate)
Description: Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
Family: unix Class: patch
Reference(s): RHSA-2011:0307-01
CESA-2011:0307
CVE-2008-0564
CVE-2010-3089
CVE-2011-0707
Version: 42
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): mailman
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21908
 
Oval ID: oval:org.mitre.oval:def:21908
Title: RHSA-2011:0308: mailman security update (Moderate)
Description: Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
Family: unix Class: patch
Reference(s): RHSA-2011:0308-01
CVE-2010-3089
CVE-2011-0707
Version: 29
Platform(s): Red Hat Enterprise Linux 6
Product(s): mailman
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23190
 
Oval ID: oval:org.mitre.oval:def:23190
Title: ELSA-2011:0308: mailman security update (Moderate)
Description: Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
Family: unix Class: patch
Reference(s): ELSA-2011:0308-01
CVE-2010-3089
CVE-2011-0707
Version: 13
Platform(s): Oracle Linux 6
Product(s): mailman
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23255
 
Oval ID: oval:org.mitre.oval:def:23255
Title: ELSA-2011:0307: mailman security update (Moderate)
Description: Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
Family: unix Class: patch
Reference(s): ELSA-2011:0307-01
CVE-2008-0564
CVE-2010-3089
CVE-2011-0707
Version: 17
Platform(s): Oracle Linux 5
Product(s): mailman
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28189
 
Oval ID: oval:org.mitre.oval:def:28189
Title: DEPRECATED: ELSA-2011-0308 -- mailman security update (moderate)
Description: [3:2.1.12-14.2] - fix #677848 - fixed build problem without brew [3:2.1.12-14.1] - fix #677848 - fixed CVE-2010-3089 and CVE-2011-0707
Family: unix Class: patch
Reference(s): ELSA-2011-0308
CVE-2010-3089
CVE-2011-0707
Version: 4
Platform(s): Oracle Linux 6
Product(s): mailman
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 52

OpenVAS Exploits

Date Description
2012-07-30 Name : CentOS Update for mailman CESA-2011:0307 centos5 x86_64
File : nvt/gb_CESA-2011_0307_mailman_centos5_x86_64.nasl
2012-07-09 Name : RedHat Update for mailman RHSA-2011:0308-01
File : nvt/gb_RHSA-2011_0308-01_mailman.nasl
2011-10-20 Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2011-006)
File : nvt/gb_macosx_su11-006.nasl
2011-08-09 Name : CentOS Update for mailman CESA-2011:0307 centos5 i386
File : nvt/gb_CESA-2011_0307_mailman_centos5_i386.nasl
2011-05-12 Name : FreeBSD Ports: mailman
File : nvt/freebsd_mailman9.nasl
2011-03-24 Name : Fedora Update for mailman FEDORA-2011-2102
File : nvt/gb_fedora_2011_2102_mailman_fc14.nasl
2011-03-24 Name : Fedora Update for mailman FEDORA-2011-2125
File : nvt/gb_fedora_2011_2125_mailman_fc13.nasl
2011-03-09 Name : Debian Security Advisory DSA 2170-1 (mailman)
File : nvt/deb_2170_1.nasl
2011-03-07 Name : CentOS Update for mailman CESA-2011:0307 centos4 i386
File : nvt/gb_CESA-2011_0307_mailman_centos4_i386.nasl
2011-03-07 Name : RedHat Update for mailman RHSA-2011:0307-01
File : nvt/gb_RHSA-2011_0307-01_mailman.nasl
2011-02-28 Name : Mandriva Update for mailman MDVSA-2011:036 (mailman)
File : nvt/gb_mandriva_MDVSA_2011_036.nasl
2011-02-28 Name : Ubuntu Update for mailman vulnerabilities USN-1069-1
File : nvt/gb_ubuntu_USN_1069_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
70936 Mailman Cgi/confirm.py Multiple Parameter XSS

Mailman contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the 'full name' or 'username' fields in confirmation messages upon submission to the Cgi/confirm.py script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_mailman-110331.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2011-0307.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2011-0308.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20110301_mailman_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20110301_mailman_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2011-12-13 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_mailman-7484.nasl - Type : ACT_GATHER_INFO
2011-10-13 Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_SecUpd2011-006.nasl - Type : ACT_GATHER_INFO
2011-05-05 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_mailman-110426.nasl - Type : ACT_GATHER_INFO
2011-05-04 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_mailman-7489.nasl - Type : ACT_GATHER_INFO
2011-05-02 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_mailman-110426.nasl - Type : ACT_GATHER_INFO
2011-03-22 Name : The remote Fedora host is missing a security update.
File : fedora_2011-2030.nasl - Type : ACT_GATHER_INFO
2011-03-22 Name : The remote Fedora host is missing a security update.
File : fedora_2011-2102.nasl - Type : ACT_GATHER_INFO
2011-03-22 Name : The remote Fedora host is missing a security update.
File : fedora_2011-2125.nasl - Type : ACT_GATHER_INFO
2011-03-11 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_64691c494b2211e0a22600e0815b8da8.nasl - Type : ACT_GATHER_INFO
2011-03-03 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2011-0307.nasl - Type : ACT_GATHER_INFO
2011-03-02 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2011-0307.nasl - Type : ACT_GATHER_INFO
2011-03-02 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0308.nasl - Type : ACT_GATHER_INFO
2011-02-24 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2011-036.nasl - Type : ACT_GATHER_INFO
2011-02-23 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1069-1.nasl - Type : ACT_GATHER_INFO
2011-02-21 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2170.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056363.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056387.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056399.html
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
http://lists.opensuse.org/opensuse-updates/2011-05/msg00000.html
http://mail.python.org/pipermail/mailman-announce/2011-February/000157.html
http://mail.python.org/pipermail/mailman-announce/2011-February/000158.html
http://osvdb.org/70936
http://secunia.com/advisories/43294
http://secunia.com/advisories/43389
http://secunia.com/advisories/43425
http://secunia.com/advisories/43549
http://secunia.com/advisories/43580
http://secunia.com/advisories/43829
http://support.apple.com/kb/HT5002
http://www.debian.org/security/2011/dsa-2170
http://www.mandriva.com/security/advisories?name=MDVSA-2011:036
http://www.redhat.com/support/errata/RHSA-2011-0307.html
http://www.redhat.com/support/errata/RHSA-2011-0308.html
http://www.securityfocus.com/bid/46464
http://www.securitytracker.com/id?1025106
http://www.ubuntu.com/usn/USN-1069-1
http://www.vupen.com/english/advisories/2011/0435
http://www.vupen.com/english/advisories/2011/0436
http://www.vupen.com/english/advisories/2011/0460
http://www.vupen.com/english/advisories/2011/0487
http://www.vupen.com/english/advisories/2011/0542
http://www.vupen.com/english/advisories/2011/0720
https://exchange.xforce.ibmcloud.com/vulnerabilities/65538
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Date Informations
2024-11-28 23:05:58
  • Multiple Updates
2024-11-28 12:24:49
  • Multiple Updates
2023-02-13 09:29:00
  • Multiple Updates
2023-02-02 21:28:49
  • Multiple Updates
2021-05-05 01:08:08
  • Multiple Updates
2021-05-04 12:13:59
  • Multiple Updates
2021-04-22 01:15:09
  • Multiple Updates
2020-05-23 01:43:52
  • Multiple Updates
2020-05-23 00:27:47
  • Multiple Updates
2018-02-09 12:01:08
  • Multiple Updates
2017-08-17 09:23:18
  • Multiple Updates
2016-09-04 01:00:53
  • Multiple Updates
2016-06-28 18:33:05
  • Multiple Updates
2016-04-26 20:32:47
  • Multiple Updates
2014-06-14 13:30:19
  • Multiple Updates
2014-02-21 13:21:38
  • Multiple Updates
2014-02-17 11:00:28
  • Multiple Updates
2013-05-10 22:54:35
  • Multiple Updates