FreeBSD : mailman -- CSRF hardening in parts of the web interface (9e50dcc3-740b-11e6-94a2-080027ef73ec)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The late Tokio Kikuchi reported :

We may have to set lifetime for input forms because of recent
activities on cross-site request forgery (CSRF). The form lifetime is
successfully deployed in frameworks like web.py or plone etc. Proposed
branch lp:~tkikuchi/mailman/form-lifetime implement lifetime in admin,
admindb, options and edithtml interfaces. [...]

The web admin interface has been hardened against CSRF attacks by
adding a hidden, encrypted token with a time stamp to form submissions
and not accepting authentication by cookie if the token is missing,
invalid or older than the new mm_cfg.py setting FORM_LIFETIME which
defaults to one hour. Posthumous thanks go to Tokio Kikuchi for this
implementation [...].

See also :

https://bugs.launchpad.net/mailman/+bug/775294
https://launchpad.net/mailman/2.1/2.1.15
http://www.nessus.org/u?d679a3a4

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 93361 ()

Bugtraq ID:

CVE ID: CVE-2016-7123

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now