GNU Mailman < 2.1.6 Directory Traversal Arbitrary File Access

medium Nessus Network Monitor Plugin ID 2607

Synopsis

The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data

Description

The remote host is running GNU Mailman, a web based software to manage mailing lists. There is a flaw in this version of Mailman that would allow a remote attacker to retrieve potentially confidential data. Specifically, the CGI script 'private.py' does not properly parse user-supplied data and would allow an attacker to read any file on the operating system that was readable by the web process.

Solution

Upgrade to version 2.1.6 or higher.

See Also

http://archives.neohapsis.com/archives/fulldisclosure/2005-02/0109.html

http://mail.python.org/pipermail/mailman-announce/2005-February/000076.html

Plugin Details

Severity: Medium

ID: 2607

Family: CGI

Published: 2/10/2005

Updated: 3/6/2019

Nessus ID: 16339

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:gnu:mailman

Reference Information

CVE: CVE-2005-0202, CVE-2006-0052

BID: 17311, 12504