FreeBSD : mailman XSS in admin script (3cb88bb2-67a6-11d8-80e3-0020ed76ef5a)

Medium Nessus Plugin ID 36998


The remote FreeBSD host is missing a security-related update.


Dirk Mueller reports :

I've found a cross-site scripting vulnerability in the admin interface of mailman 2.1.3 that allows, under certain circumstances, for anyone to retrieve the (valid) session cookie.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 36998

File Name: freebsd_pkg_3cb88bb267a611d880e30020ed76ef5a.nasl

Version: $Revision: 1.8 $

Type: local

Published: 2009/04/23

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:mailman, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2004/02/25

Vulnerability Publication Date: 2003/12/31

Reference Information

CVE: CVE-2003-0965