Mailman < 2.1.9rc1 Spoofed Log Entry Injection

Medium Nessus Network Monitor Plugin ID 3737

Synopsis

The remote web server contains a Python application that is affected by a log spoofing vulnerability.

Description

The version of Mailman installed on the remote host fails to sanitize user-supplied input before writing it to the application's 'error' log. An unauthenticated remote attacker can leverage this flaw to spoof log messages. In addition, the application is reportedly affected by a denial of service issue involving headers that do not conform to RFC 2231 as well as several cross-site scripting vulnerabilities.

Solution

Upgrade to version 2.1.9rc1 or higher.

See Also

http://moritz-naumann.com/adv/0013/mailmanmulti/0013.txt

http://archives.neohapsis.com/archives/fulldisclosure/2006-09/0244.html

http://sourceforge.net/project/shownotes.php?release_id=444295&amp;group_id=103

http://mail.python.org/pipermail/mailman-announce/2006-September/000086.html

Plugin Details

Severity: Medium

ID: 3737

Family: CGI

Published: 2006/09/05

Modified: 2016/02/05

Dependencies: 1442

Nessus ID: 22307

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 4.1

Temporal Score: 3.8

Vector: CVSS3#AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Reference Information

CVE: CVE-2006-3636, CVE-2006-2941, CVE-2006-4624

BID: 19831, 20021