Mailman < 2.1.9rc1 Spoofed Log Entry Injection

medium Nessus Network Monitor Plugin ID 3737

Synopsis

The remote web server contains a Python application that is affected by a log spoofing vulnerability.

Description

The version of Mailman installed on the remote host fails to sanitize user-supplied input before writing it to the application's 'error' log. An unauthenticated remote attacker can leverage this flaw to spoof log messages. In addition, the application is reportedly affected by a denial of service issue involving headers that do not conform to RFC 2231 as well as several cross-site scripting vulnerabilities.

Solution

Upgrade to version 2.1.9rc1 or higher.

See Also

http://moritz-naumann.com/adv/0013/mailmanmulti/0013.txt

http://archives.neohapsis.com/archives/fulldisclosure/2006-09/0244.html

http://sourceforge.net/project/shownotes.php?release_id=444295&group_id=103

http://mail.python.org/pipermail/mailman-announce/2006-September/000086.html

Plugin Details

Severity: Medium

ID: 3737

Family: CGI

Published: 9/5/2006

Updated: 3/6/2019

Nessus ID: 22307

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.2

Temporal Score: 3.9

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:gnu:mailman

Reference Information

CVE: CVE-2006-2941, CVE-2006-3636, CVE-2006-4624

BID: 19831, 20021