Executive Summary
Summary | |
---|---|
Title | Mailman vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-1069-1 | First vendor Publication | 2011-02-22 |
Vendor | Ubuntu | Last vendor Modification | 2011-02-22 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 9.10 Ubuntu 10.04 LTS Ubuntu 10.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: Ubuntu 8.04 LTS: Ubuntu 9.10: Ubuntu 10.04 LTS: Ubuntu 10.10: In general, a standard system update will make all the necessary changes. Details follow: It was discovered that Mailman did not properly sanitize certain fields, resulting in cross-site scripting (XSS) vulnerabilities. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. |
Original Source
Url : http://www.ubuntu.com/usn/USN-1069-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12397 | |||
Oval ID: | oval:org.mitre.oval:def:12397 | ||
Title: | DSA-2170-1 mailman -- several | ||
Description: | Two cross site scripting vulnerabilities were been discovered in Mailman, a web-based mailing list manager. These allowed an attacker to retreive session cookies via inserting crafted JavaScript into confirmation messages and in the list admin interface . | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2170-1 CVE-2010-3089 CVE-2011-0707 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | mailman |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:13726 | |||
Oval ID: | oval:org.mitre.oval:def:13726 | ||
Title: | USN-1069-1 -- mailman vulnerabilities | ||
Description: | It was discovered that Mailman did not properly sanitize certain fields, resulting in cross-site scripting vulnerabilities. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1069-1 CVE-2010-3089 CVE-2011-0707 | Version: | 5 |
Platform(s): | Ubuntu 8.04 Ubuntu 10.10 Ubuntu 10.04 Ubuntu 9.10 Ubuntu 6.06 | Product(s): | mailman |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21661 | |||
Oval ID: | oval:org.mitre.oval:def:21661 | ||
Title: | RHSA-2011:0307: mailman security update (Moderate) | ||
Description: | Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0307-01 CESA-2011:0307 CVE-2008-0564 CVE-2010-3089 CVE-2011-0707 | Version: | 42 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | mailman |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21908 | |||
Oval ID: | oval:org.mitre.oval:def:21908 | ||
Title: | RHSA-2011:0308: mailman security update (Moderate) | ||
Description: | Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0308-01 CVE-2010-3089 CVE-2011-0707 | Version: | 29 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | mailman |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23190 | |||
Oval ID: | oval:org.mitre.oval:def:23190 | ||
Title: | ELSA-2011:0308: mailman security update (Moderate) | ||
Description: | Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0308-01 CVE-2010-3089 CVE-2011-0707 | Version: | 13 |
Platform(s): | Oracle Linux 6 | Product(s): | mailman |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23255 | |||
Oval ID: | oval:org.mitre.oval:def:23255 | ||
Title: | ELSA-2011:0307: mailman security update (Moderate) | ||
Description: | Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0307-01 CVE-2008-0564 CVE-2010-3089 CVE-2011-0707 | Version: | 17 |
Platform(s): | Oracle Linux 5 | Product(s): | mailman |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28189 | |||
Oval ID: | oval:org.mitre.oval:def:28189 | ||
Title: | DEPRECATED: ELSA-2011-0308 -- mailman security update (moderate) | ||
Description: | [3:2.1.12-14.2] - fix #677848 - fixed build problem without brew [3:2.1.12-14.1] - fix #677848 - fixed CVE-2010-3089 and CVE-2011-0707 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-0308 CVE-2010-3089 CVE-2011-0707 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | mailman |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-07-30 | Name : CentOS Update for mailman CESA-2011:0307 centos5 x86_64 File : nvt/gb_CESA-2011_0307_mailman_centos5_x86_64.nasl |
2012-07-09 | Name : RedHat Update for mailman RHSA-2011:0308-01 File : nvt/gb_RHSA-2011_0308-01_mailman.nasl |
2011-10-20 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2011-006) File : nvt/gb_macosx_su11-006.nasl |
2011-08-26 | Name : Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001) File : nvt/secpod_macosx_su11-001.nasl |
2011-08-09 | Name : CentOS Update for mailman CESA-2011:0307 centos5 i386 File : nvt/gb_CESA-2011_0307_mailman_centos5_i386.nasl |
2011-05-12 | Name : FreeBSD Ports: mailman File : nvt/freebsd_mailman9.nasl |
2011-03-24 | Name : Fedora Update for mailman FEDORA-2011-2102 File : nvt/gb_fedora_2011_2102_mailman_fc14.nasl |
2011-03-24 | Name : Fedora Update for mailman FEDORA-2011-2125 File : nvt/gb_fedora_2011_2125_mailman_fc13.nasl |
2011-03-09 | Name : Debian Security Advisory DSA 2170-1 (mailman) File : nvt/deb_2170_1.nasl |
2011-03-07 | Name : CentOS Update for mailman CESA-2011:0307 centos4 i386 File : nvt/gb_CESA-2011_0307_mailman_centos4_i386.nasl |
2011-03-07 | Name : RedHat Update for mailman RHSA-2011:0307-01 File : nvt/gb_RHSA-2011_0307-01_mailman.nasl |
2011-02-28 | Name : Ubuntu Update for mailman vulnerabilities USN-1069-1 File : nvt/gb_ubuntu_USN_1069_1.nasl |
2011-02-28 | Name : Mandriva Update for mailman MDVSA-2011:036 (mailman) File : nvt/gb_mandriva_MDVSA_2011_036.nasl |
2010-12-28 | Name : Fedora Update for mailman FEDORA-2010-14834 File : nvt/gb_fedora_2010_14834_mailman_fc14.nasl |
2010-12-28 | Name : Fedora Update for mailman FEDORA-2010-14877 File : nvt/gb_fedora_2010_14877_mailman_fc13.nasl |
2010-11-17 | Name : FreeBSD Ports: mailman File : nvt/freebsd_mailman8.nasl |
2010-10-04 | Name : Mandriva Update for mailman MDVSA-2010:191 (mailman) File : nvt/gb_mandriva_MDVSA_2010_191.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
70936 | Mailman Cgi/confirm.py Multiple Parameter XSS Mailman contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the 'full name' or 'username' fields in confirmation messages upon submission to the Cgi/confirm.py script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
68035 | Mailman listinfo.py List Description Field XSS Mailman contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the 'List Description' Field upon submission to the 'listinfo.py' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
68032 | Mailman HTMLFormatter.py List Description Field XSS Mailman contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the 'List Description' Field upon submission to the 'HTMLFormatter.py' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_mailman-110331.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2011-0308.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2011-0307.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20110301_mailman_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20110301_mailman_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_mailman-7484.nasl - Type : ACT_GATHER_INFO |
2011-10-13 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2011-006.nasl - Type : ACT_GATHER_INFO |
2011-05-19 | Name : A web application on the remote host has multiple cross-site scripting vulner... File : mailman_2_1_14.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_mailman-110426.nasl - Type : ACT_GATHER_INFO |
2011-05-04 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_mailman-7489.nasl - Type : ACT_GATHER_INFO |
2011-05-02 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_mailman-110426.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2011-001.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_10_6_7.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote Fedora host is missing a security update. File : fedora_2011-2125.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote Fedora host is missing a security update. File : fedora_2011-2102.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote Fedora host is missing a security update. File : fedora_2011-2030.nasl - Type : ACT_GATHER_INFO |
2011-03-11 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_64691c494b2211e0a22600e0815b8da8.nasl - Type : ACT_GATHER_INFO |
2011-03-03 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2011-0307.nasl - Type : ACT_GATHER_INFO |
2011-03-02 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2011-0307.nasl - Type : ACT_GATHER_INFO |
2011-03-02 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0308.nasl - Type : ACT_GATHER_INFO |
2011-02-24 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2011-036.nasl - Type : ACT_GATHER_INFO |
2011-02-23 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1069-1.nasl - Type : ACT_GATHER_INFO |
2011-02-21 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2170.nasl - Type : ACT_GATHER_INFO |
2010-12-20 | Name : The remote Fedora host is missing a security update. File : fedora_2010-14877.nasl - Type : ACT_GATHER_INFO |
2010-12-20 | Name : The remote Fedora host is missing a security update. File : fedora_2010-14834.nasl - Type : ACT_GATHER_INFO |
2010-11-04 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_4ab29e12e78711dfadfa00e0815b8da8.nasl - Type : ACT_GATHER_INFO |
2010-10-06 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2010-191.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:58:18 |
|