FreeBSD : mailman -- hardening against malicious listowners injecting evil HTML scripts (739948e3-78bf-11e8-b23c-080027ac955c)

Low Nessus Plugin ID 110691


The remote FreeBSD host is missing one or more security-related updates.


Mark Sapiro reports :

Existing protections against malicious listowners injecting evil scripts into listinfo pages have had a few more checks added.

A few more error messages have had their values HTML escaped.

The hash generated when SUBSCRIBE_FORM_SECRET is set could have been the same as one generated at the same time for a different list and IP address.


Update the affected packages.

See Also[email protected]/

Plugin Details

Severity: Low

ID: 110691

File Name: freebsd_pkg_739948e378bf11e8b23c080027ac955c.nasl

Version: 1.4

Type: local

Published: 2018/06/26

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: Low

CVSS v2.0

Base Score: 3.5

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS v3.0

Base Score: 5.4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ja-mailman, p-cpe:/a:freebsd:freebsd:mailman, p-cpe:/a:freebsd:freebsd:mailman-with-htdig, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2018/06/25

Vulnerability Publication Date: 2018/03/09

Reference Information

CVE: CVE-2018-0618