CERTA-2002-AVI-197

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité de type cross-site scripting est présente dans un des scripts CGI de mailman.

Description

Mailman est un logiciel permettant de gérer des listes de diffusion.

Le script CGI ml-name ne filtre pas correctement les données reçues.

Un utilisateur mal intentionné peut exploiter cette vulnérabilité afin d'exécuter des scripts sur un poste client accédant à l'application mailman vulnérable au travers de son navigateur (vulnérabilité de type cross-site scripting). Il est alors possible de récupérer les données d'authentification du poste client ou de lire les données transmises au site vulnérable par l'utilisateur.

Solution

La version 2.0.12 de mailman corrige cette vulnérabilité.

Mailman versions 2.0.11 et antérieures.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eMailman versions 2.0.11 et ant\u00e9rieures.\u003c/p\u003e",
  "content": "## Description\n\nMailman est un logiciel permettant de g\u00e9rer des listes de diffusion.\n\n  \nLe script CGI ml-name ne filtre pas correctement les donn\u00e9es re\u00e7ues.\n\nUn utilisateur mal intentionn\u00e9 peut exploiter cette vuln\u00e9rabilit\u00e9 afin\nd\u0027ex\u00e9cuter des scripts sur un poste client acc\u00e9dant \u00e0 l\u0027application\nmailman vuln\u00e9rable au travers de son navigateur (vuln\u00e9rabilit\u00e9 de type\ncross-site scripting). Il est alors possible de r\u00e9cup\u00e9rer les donn\u00e9es\nd\u0027authentification du poste client ou de lire les donn\u00e9es transmises au\nsite vuln\u00e9rable par l\u0027utilisateur.\n\n## Solution\n\nLa version 2.0.12 de mailman corrige cette vuln\u00e9rabilit\u00e9.\n",
  "cves": [],
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 DSA-147 de Debian :",
      "url": "http://www.debian.org/security/2002/dsa-147"
    },
    {
      "title": "Message \"Released Mailman 2.0.12\" sur la liste de diffusion    Mailman-Developper :",
      "url": "http://python.org/msg03563.html"
    },
    {
      "title": "Note d\u0027information CERTA-2002-INF-001 du CERTA :",
      "url": "http://www.certa.ssi.gouv.fr/site/CERTA-2002-INF-001/index.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RHSA-2002:176 de RedHat :",
      "url": "http://rhn.redhat.com/errata/RHSA-2002-176.html"
    },
    {
      "title": "Site de mailman :",
      "url": "http://www.gnu.org/software/mailman"
    }
  ],
  "reference": "CERTA-2002-AVI-197",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2002-08-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Perte de confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Usurpation d\u0027identit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 de type cross-site scripting est pr\u00e9sente dans un des\nscripts CGI de mailman.\n",
  "title": "Vuln\u00e9rabilit\u00e9 de mailman",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 DSA-147 de Debian.",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…