mailman: CVE-2018-13796: Arbitrary text injection vulnerability in Mailman CGIs

Related Vulnerabilities: CVE-2018-13796  

Debian Bug report logs - #903674
mailman: CVE-2018-13796: Arbitrary text injection vulnerability in Mailman CGIs

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Thu, 12 Jul 2018 19:42:01 UTC

Severity: important

Tags: fixed-upstream, patch, security, upstream

Found in version mailman/1:2.1.23-1

Fixed in versions mailman/1:2.1.27-1.1, mailman/1:2.1.23-1+deb9u4

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Forwarded to https://bugs.launchpad.net/mailman/+bug/1780874

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Mailman for Debian <pkg-mailman-hackers@lists.alioth.debian.org>:
Bug#903674; Package src:mailman. (Thu, 12 Jul 2018 19:42:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Mailman for Debian <pkg-mailman-hackers@lists.alioth.debian.org>. (Thu, 12 Jul 2018 19:42:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: mailman: CVE-2018-13796: (yet) unspecified vulnerability in mailman
Date: Thu, 12 Jul 2018 21:40:07 +0200
Source: mailman
Version: 1:2.1.23-1
Severity: important
Tags: security upstream

Hi,

The following vulnerability was published for mailman, details are not
yet published. The 2.1.28 release along with details will be on 23th
July 2018.

CVE-2018-13796[0]:
| Unspecified vulnerability in Mailman before 2.1.28 has unknown impact
| and attack vectors.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-13796
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13796
[1] https://mail.python.org/pipermail/mailman-users/2018-July/083536.html
[2] https://mail.python.org/pipermail/mailman-users/2018-July/083537.html

Regards,
Salvatore



Set Bug forwarded-to-address to 'https://bugs.launchpad.net/mailman/+bug/1780874'. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Tue, 24 Jul 2018 07:36:04 GMT) (full text, mbox, link).


Added tag(s) fixed-upstream. Request was from debian-bts-link@lists.debian.org to control@bugs.debian.org. (Mon, 30 Jul 2018 17:15:08 GMT) (full text, mbox, link).


Changed Bug title to 'mailman: CVE-2018-13796: Arbitrary text injection vulnerability in Mailman CGIs' from 'mailman: CVE-2018-13796: (yet) unspecified vulnerability in mailman'. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 02 Sep 2018 20:09:06 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Mailman for Debian <pkg-mailman-hackers@lists.alioth.debian.org>:
Bug#903674; Package src:mailman. (Sun, 02 Sep 2018 20:45:16 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Mailman for Debian <pkg-mailman-hackers@lists.alioth.debian.org>. (Sun, 02 Sep 2018 20:45:16 GMT) (full text, mbox, link).


Message #16 received at 903674@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 903674@bugs.debian.org
Subject: mailman: diff for NMU version 1:2.1.27-1.1
Date: Sun, 2 Sep 2018 22:40:04 +0200
[Message part 1 (text/plain, inline)]
Control: tags 903674 + patch
Control: tags 903674 + pending


Dear maintainer,

I've prepared an NMU for mailman (versioned as 1:2.1.27-1.1) and
uploaded it to DELAYED/10. Please feel free to tell me if I
should delay it longer.

Regards,
Salvatore
[mailman-2.1.27-1.1-nmu.diff (text/x-diff, attachment)]

Added tag(s) patch. Request was from Salvatore Bonaccorso <carnil@debian.org> to 903674-submit@bugs.debian.org. (Sun, 02 Sep 2018 20:45:16 GMT) (full text, mbox, link).


Added tag(s) pending. Request was from Salvatore Bonaccorso <carnil@debian.org> to 903674-submit@bugs.debian.org. (Sun, 02 Sep 2018 20:45:17 GMT) (full text, mbox, link).


Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Mon, 03 Sep 2018 19:39:05 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Mon, 03 Sep 2018 19:39:05 GMT) (full text, mbox, link).


Message #25 received at 903674-close@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 903674-close@bugs.debian.org
Subject: Bug#903674: fixed in mailman 1:2.1.27-1.1
Date: Mon, 03 Sep 2018 19:35:11 +0000
Source: mailman
Source-Version: 1:2.1.27-1.1

We believe that the bug you reported is fixed in the latest version of
mailman, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 903674@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated mailman package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 02 Sep 2018 22:23:45 +0200
Source: mailman
Binary: mailman
Architecture: source
Version: 1:2.1.27-1.1
Distribution: unstable
Urgency: medium
Maintainer: Mailman for Debian <pkg-mailman-hackers@lists.alioth.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 903674
Description: 
 mailman    - Web-based mailing list manager (legacy branch)
Changes:
 mailman (1:2.1.27-1.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Arbitrary text injection vulnerability in Mailman CGIs (CVE-2018-13796)
     (Closes: #903674)
Checksums-Sha1: 
 d3cbc18f71de7fc1f0877db423b395142e884e0e 2214 mailman_2.1.27-1.1.dsc
 b0ce80e170f8ef52c09d3c594bbb719f2daa4e8e 100180 mailman_2.1.27-1.1.debian.tar.xz
Checksums-Sha256: 
 1ee2339351038be6491d2c7c334f248177652f9d21819c5c2338f0e853431952 2214 mailman_2.1.27-1.1.dsc
 df7adcd428f0f11c3904a86415f78598d18c640f51dc91e531cd97933271b850 100180 mailman_2.1.27-1.1.debian.tar.xz
Files: 
 8b79baf0f2080635b8246c5739174c95 2214 mail optional mailman_2.1.27-1.1.dsc
 51cb7afb9ab3bff9ad8c91f26d891e5b 100180 mail optional mailman_2.1.27-1.1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=a/j8
-----END PGP SIGNATURE-----




Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Thu, 04 Oct 2018 19:18:15 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Thu, 04 Oct 2018 19:18:15 GMT) (full text, mbox, link).


Message #30 received at 903674-close@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 903674-close@bugs.debian.org
Subject: Bug#903674: fixed in mailman 1:2.1.23-1+deb9u4
Date: Thu, 04 Oct 2018 19:17:08 +0000
Source: mailman
Source-Version: 1:2.1.23-1+deb9u4

We believe that the bug you reported is fixed in the latest version of
mailman, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 903674@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated mailman package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 03 Sep 2018 22:00:38 +0200
Source: mailman
Binary: mailman
Architecture: source
Version: 1:2.1.23-1+deb9u4
Distribution: stretch
Urgency: medium
Maintainer: Mailman for Debian <pkg-mailman-hackers@lists.alioth.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 903674
Description: 
 mailman    - Powerful, web-based mailing list manager
Changes:
 mailman (1:2.1.23-1+deb9u4) stretch; urgency=medium
 .
   * Non-maintainer upload.
   * Arbitrary text injection vulnerability in Mailman CGIs (CVE-2018-13796)
     (Closes: #903674)
Checksums-Sha1: 
 3012bc7ace1fe98067d70e670dfc45178303b0dc 2308 mailman_2.1.23-1+deb9u4.dsc
 af347fe0a946afba8da9c6f214367bf0ee446221 104776 mailman_2.1.23-1+deb9u4.debian.tar.xz
Checksums-Sha256: 
 6643613999573df02a389901e731960d607fe3943ca35d21b5742090899802ea 2308 mailman_2.1.23-1+deb9u4.dsc
 1640ba7df8a208386da341e964c6577fd43cd749627285a7f401d602ccbb851e 104776 mailman_2.1.23-1+deb9u4.debian.tar.xz
Files: 
 9e953d5621120d4c4915edc2904589dc 2308 mail optional mailman_2.1.23-1+deb9u4.dsc
 e192389efc2a0e696fa288d029e2312d 104776 mail optional mailman_2.1.23-1+deb9u4.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=ue4b
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Fri, 02 Nov 2018 07:30:44 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 14:40:06 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.