Debian DSA-674-3 : mailman - XSS, directory traversal

medium Nessus Plugin ID 16348

Synopsis

The remote Debian host is missing a security-related update.

Description

Due to an incompatibility between Python 1.5 and 2.1 the last mailman update did not run with Python 1.5 anymore. This problem is corrected with this update. This advisory only updates the packages updated with DSA 674-2. The version in unstable is not affected since it is not supposed to work with Python 1.5 anymore. For completeness below is the original advisory text :

Two security related problems have been discovered in mailman, web-based GNU mailing list manager. The Common Vulnerabilities and Exposures project identifies the following problems :

- CAN-2004-1177 Florian Weimer discovered a cross-site scripting vulnerability in mailman's automatically generated error messages. An attacker could craft a URL containing JavaScript (or other content embedded into HTML) which triggered a mailman error page that would include the malicious code verbatim.

- CAN-2005-0202

Several listmasters have noticed unauthorised access to archives of private lists and the list configuration itself, including the users passwords.
Administrators are advised to check the webserver logfiles for requests that contain '/...../' and the path to the archives or configuration. This does only seem to affect installations running on web servers that do not strip slashes, such as Apache 1.3.

Solution

Upgrade the mailman package.

For the stable distribution (woody) these problems have been fixed in version 2.0.11-1woody11.

See Also

http://www.debian.org/security/2005/dsa-674

Plugin Details

Severity: Medium

ID: 16348

File Name: debian_DSA-674.nasl

Version: 1.26

Type: local

Agent: unix

Published: 2/10/2005

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:3.0, p-cpe:/a:debian:debian_linux:mailman

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 2/21/2005

Vulnerability Publication Date: 2/9/2005

Reference Information

CVE: CVE-2004-1177, CVE-2005-0202

DSA: 674