Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name MDVSA-2011:036 First vendor Publication 2011-02-23
Vendor Mandriva Last vendor Modification 2011-02-23
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability has been found and corrected in mailman:

Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message (CVE-2011-0707).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been patched to correct this issue.

Original Source

Url : http://www.mandriva.com/security/advisories?name=MDVSA-2011:036

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12397
 
Oval ID: oval:org.mitre.oval:def:12397
Title: DSA-2170-1 mailman -- several
Description: Two cross site scripting vulnerabilities were been discovered in Mailman, a web-based mailing list manager. These allowed an attacker to retreive session cookies via inserting crafted JavaScript into confirmation messages and in the list admin interface .
Family: unix Class: patch
Reference(s): DSA-2170-1
CVE-2010-3089
CVE-2011-0707
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): mailman
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13726
 
Oval ID: oval:org.mitre.oval:def:13726
Title: USN-1069-1 -- mailman vulnerabilities
Description: It was discovered that Mailman did not properly sanitize certain fields, resulting in cross-site scripting vulnerabilities. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain.
Family: unix Class: patch
Reference(s): USN-1069-1
CVE-2010-3089
CVE-2011-0707
Version: 5
Platform(s): Ubuntu 8.04
Ubuntu 10.10
Ubuntu 10.04
Ubuntu 9.10
Ubuntu 6.06
Product(s): mailman
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21661
 
Oval ID: oval:org.mitre.oval:def:21661
Title: RHSA-2011:0307: mailman security update (Moderate)
Description: Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
Family: unix Class: patch
Reference(s): RHSA-2011:0307-01
CESA-2011:0307
CVE-2008-0564
CVE-2010-3089
CVE-2011-0707
Version: 42
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): mailman
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21908
 
Oval ID: oval:org.mitre.oval:def:21908
Title: RHSA-2011:0308: mailman security update (Moderate)
Description: Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
Family: unix Class: patch
Reference(s): RHSA-2011:0308-01
CVE-2010-3089
CVE-2011-0707
Version: 29
Platform(s): Red Hat Enterprise Linux 6
Product(s): mailman
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23190
 
Oval ID: oval:org.mitre.oval:def:23190
Title: ELSA-2011:0308: mailman security update (Moderate)
Description: Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
Family: unix Class: patch
Reference(s): ELSA-2011:0308-01
CVE-2010-3089
CVE-2011-0707
Version: 13
Platform(s): Oracle Linux 6
Product(s): mailman
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23255
 
Oval ID: oval:org.mitre.oval:def:23255
Title: ELSA-2011:0307: mailman security update (Moderate)
Description: Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
Family: unix Class: patch
Reference(s): ELSA-2011:0307-01
CVE-2008-0564
CVE-2010-3089
CVE-2011-0707
Version: 17
Platform(s): Oracle Linux 5
Product(s): mailman
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28189
 
Oval ID: oval:org.mitre.oval:def:28189
Title: DEPRECATED: ELSA-2011-0308 -- mailman security update (moderate)
Description: [3:2.1.12-14.2] - fix #677848 - fixed build problem without brew [3:2.1.12-14.1] - fix #677848 - fixed CVE-2010-3089 and CVE-2011-0707
Family: unix Class: patch
Reference(s): ELSA-2011-0308
CVE-2010-3089
CVE-2011-0707
Version: 4
Platform(s): Oracle Linux 6
Product(s): mailman
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 52

OpenVAS Exploits

Date Description
2012-07-30 Name : CentOS Update for mailman CESA-2011:0307 centos5 x86_64
File : nvt/gb_CESA-2011_0307_mailman_centos5_x86_64.nasl
2012-07-09 Name : RedHat Update for mailman RHSA-2011:0308-01
File : nvt/gb_RHSA-2011_0308-01_mailman.nasl
2011-10-20 Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2011-006)
File : nvt/gb_macosx_su11-006.nasl
2011-08-09 Name : CentOS Update for mailman CESA-2011:0307 centos5 i386
File : nvt/gb_CESA-2011_0307_mailman_centos5_i386.nasl
2011-05-12 Name : FreeBSD Ports: mailman
File : nvt/freebsd_mailman9.nasl
2011-03-24 Name : Fedora Update for mailman FEDORA-2011-2102
File : nvt/gb_fedora_2011_2102_mailman_fc14.nasl
2011-03-24 Name : Fedora Update for mailman FEDORA-2011-2125
File : nvt/gb_fedora_2011_2125_mailman_fc13.nasl
2011-03-09 Name : Debian Security Advisory DSA 2170-1 (mailman)
File : nvt/deb_2170_1.nasl
2011-03-07 Name : CentOS Update for mailman CESA-2011:0307 centos4 i386
File : nvt/gb_CESA-2011_0307_mailman_centos4_i386.nasl
2011-03-07 Name : RedHat Update for mailman RHSA-2011:0307-01
File : nvt/gb_RHSA-2011_0307-01_mailman.nasl
2011-02-28 Name : Mandriva Update for mailman MDVSA-2011:036 (mailman)
File : nvt/gb_mandriva_MDVSA_2011_036.nasl
2011-02-28 Name : Ubuntu Update for mailman vulnerabilities USN-1069-1
File : nvt/gb_ubuntu_USN_1069_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
70936 Mailman Cgi/confirm.py Multiple Parameter XSS

Mailman contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the 'full name' or 'username' fields in confirmation messages upon submission to the Cgi/confirm.py script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_mailman-110331.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2011-0307.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2011-0308.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20110301_mailman_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20110301_mailman_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2011-12-13 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_mailman-7484.nasl - Type : ACT_GATHER_INFO
2011-10-13 Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_SecUpd2011-006.nasl - Type : ACT_GATHER_INFO
2011-05-05 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_mailman-110426.nasl - Type : ACT_GATHER_INFO
2011-05-04 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_mailman-7489.nasl - Type : ACT_GATHER_INFO
2011-05-02 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_mailman-110426.nasl - Type : ACT_GATHER_INFO
2011-03-22 Name : The remote Fedora host is missing a security update.
File : fedora_2011-2030.nasl - Type : ACT_GATHER_INFO
2011-03-22 Name : The remote Fedora host is missing a security update.
File : fedora_2011-2102.nasl - Type : ACT_GATHER_INFO
2011-03-22 Name : The remote Fedora host is missing a security update.
File : fedora_2011-2125.nasl - Type : ACT_GATHER_INFO
2011-03-11 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_64691c494b2211e0a22600e0815b8da8.nasl - Type : ACT_GATHER_INFO
2011-03-03 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2011-0307.nasl - Type : ACT_GATHER_INFO
2011-03-02 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2011-0307.nasl - Type : ACT_GATHER_INFO
2011-03-02 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0308.nasl - Type : ACT_GATHER_INFO
2011-02-24 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2011-036.nasl - Type : ACT_GATHER_INFO
2011-02-23 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1069-1.nasl - Type : ACT_GATHER_INFO
2011-02-21 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2170.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:42:05
  • Multiple Updates