FreeBSD : mailman -- CSRF hardening in parts of the web interface (9e50dcc3-740b-11e6-94a2-080027ef73ec)

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The late Tokio Kikuchi reported :

We may have to set lifetime for input forms because of recent
activities on cross-site request forgery (CSRF). The form lifetime is
successfully deployed in frameworks like or plone etc. Proposed
branch lp:~tkikuchi/mailman/form-lifetime implement lifetime in admin,
admindb, options and edithtml interfaces. [...]

The web admin interface has been hardened against CSRF attacks by
adding a hidden, encrypted token with a time stamp to form submissions
and not accepting authentication by cookie if the token is missing,
invalid or older than the new setting FORM_LIFETIME which
defaults to one hour. Posthumous thanks go to Tokio Kikuchi for this
implementation [...].

See also :

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.8

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 93361 ()

Bugtraq ID:

CVE ID: CVE-2016-7123

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now