Mailman < 2.1.9rc1 Spoofed Log Entry Injection

Medium Nessus Network Monitor Plugin ID 3737


The remote web server contains a Python application that is affected by a log spoofing vulnerability.


The version of Mailman installed on the remote host fails to sanitize user-supplied input before writing it to the application's 'error' log. An unauthenticated remote attacker can leverage this flaw to spoof log messages. In addition, the application is reportedly affected by a denial of service issue involving headers that do not conform to RFC 2231 as well as several cross-site scripting vulnerabilities.


Upgrade to version 2.1.9rc1 or higher.

See Also;group_id=103

Plugin Details

Severity: Medium

ID: 3737

Family: CGI

Published: 2006/09/05

Modified: 2016/02/05

Dependencies: 1442

Nessus ID: 22307

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 4.1

Temporal Score: 3.8


Temporal Vector: CVSS3#E:F/RL:O/RC:C

Reference Information

CVE: CVE-2006-3636, CVE-2006-2941, CVE-2006-4624

BID: 19831, 20021