Vulnerability CVE-2021-44227: Information

Description

In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.

Severity: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Published: Dec. 2, 2021
Modified: Dec. 9, 2022
Error type identifier: CWE-352

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
mailmansisyphus2.1.38-alt12.1.39-alt1ALT-PU-2021-3439-1291126Fixed
mailmansisyphus_e2k2.1.38-alt12.1.39-alt1ALT-PU-2021-4565-1-Fixed
mailmanp102.1.38-alt12.1.39-alt1ALT-PU-2021-3511-1291151Fixed
mailmanp10_e2k2.1.39-alt12.1.39-alt1ALT-PU-2024-7728-1-Fixed
mailmanc10f12.1.38-alt12.1.38-alt1ALT-PU-2021-3511-1291151Fixed
mailmanp112.1.38-alt12.1.39-alt1ALT-PU-2021-3439-1291126Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://bugs.launchpad.net/mailman/+bug/1952384
  • Issue Tracking
  • Mailing List
  • Patch
  • Third Party Advisory
[debian-lts-announce] 20220609 [SECURITY] [DLA 3049-1] mailman security update
  • Mailing List
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*
      End excliding
      2.1.38

      Configuration 2

      cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*