4.3
CVSSv2

CVE-2004-1177

Published: 10/01/2005 Updated: 11/10/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in the driver script in mailman prior to 2.1.5 allows remote malicious users to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu mailman 2.0.12

gnu mailman 2.0.13

gnu mailman 2.0.8

gnu mailman 2.0.9

gnu mailman 2.1.4

gnu mailman 2.1b1

gnu mailman 2.0

gnu mailman 2.0.1

gnu mailman 2.0.4

gnu mailman 2.0.5

gnu mailman 2.1

gnu mailman 2.1.1

gnu mailman 2.0.10

gnu mailman 2.0.11

gnu mailman 2.0.6

gnu mailman 2.0.7

gnu mailman 2.1.2

gnu mailman 2.1.3

gnu mailman 1.0

gnu mailman 1.1

gnu mailman 2.0.2

gnu mailman 2.0.3

Vendor Advisories

Synopsis mailman security update Type/Severity Security Advisory: Important Topic An updated mailman package that corrects a cross-site scripting flaw is nowavailableThis update has been rated as having important security impact by the RedHat Security Response Team Description Mailman man ...
Florian Weimer discovered a cross-site scripting vulnerability in mailman’s automatically generated error messages An attacker could craft an URL containing JavaScript (or other content embedded into HTML) which triggered a mailman error page When an unsuspecting user followed this URL, the malicious content was copied unmodified to the error p ...
Due to an incompatibility between Python 15 and 21 the last mailman update did not run with Python 15 anymore This problem is corrected with this update This advisory only updates the packages updated with DSA 674-2 The version in unstable is not affected since it is not supposed to work with Python 15 anymore For completeness below is the ...