3.5
CVSSv2

CVE-2010-3089

Published: 15/09/2010 Updated: 13/02/2023
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in GNU Mailman prior to 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving (1) the list information field or (2) the list description field.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu mailman 2.1.5

gnu mailman 2.1.11

gnu mailman 2.1.3

gnu mailman 2.1.8

gnu mailman 2.1.13

gnu mailman 2.1.2

gnu mailman 2.1.9

gnu mailman 2.1

gnu mailman 2.1.6

gnu mailman

gnu mailman 2.1.10

gnu mailman 2.1.1

gnu mailman 2.1.12

gnu mailman 2.1.7

gnu mailman 2.1.4

Vendor Advisories

Debian Bug report logs - #599833 CVE-2010-3089 Package: mailman; Maintainer for mailman is Mailman for Debian <pkg-mailman-hackers@listsaliothdebianorg>; Source for mailman is src:mailman (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 11 Oct 2010 17:54:12 UTC Severity: grave Tag ...
It was discovered that Mailman did not properly sanitize certain fields, resulting in cross-site scripting (XSS) vulnerabilities With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, withi ...
Two cross site scripting vulnerabilities were been discovered in Mailman, a web-based mailing list manager These allowed an attacker to retrieve session cookies via inserting crafted JavaScript into confirmation messages (CVE-2011-0707) and in the list admin interface (CVE-2010-3089; oldstable only) For the oldstable distribution (lenny), these p ...

References

CWE-79http://marc.info/?l=oss-security&m=128440851513718&w=2https://bugzilla.redhat.com/show_bug.cgi?id=631859http://marc.info/?l=oss-security&m=128441369020123&w=2http://marc.info/?l=oss-security&m=128438736513097&w=2http://marc.info/?l=oss-security&m=128441135117819&w=2http://secunia.com/advisories/41265http://mail.python.org/pipermail/mailman-announce/2010-September/000150.htmlhttps://launchpad.net/mailman/+milestone/2.1.14rc1http://mail.python.org/pipermail/mailman-announce/2010-September/000151.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=631881http://marc.info/?l=oss-security&m=128441237618793&w=2http://www.vupen.com/english/advisories/2010/3271http://secunia.com/advisories/42502http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052297.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-December/052312.htmlhttp://www.vupen.com/english/advisories/2011/0436http://secunia.com/advisories/43294http://www.debian.org/security/2011/dsa-2170http://www.ubuntu.com/usn/USN-1069-1http://www.vupen.com/english/advisories/2011/0460http://secunia.com/advisories/43425http://secunia.com/advisories/43580http://www.vupen.com/english/advisories/2011/0542http://secunia.com/advisories/43549http://www.redhat.com/support/errata/RHSA-2011-0308.htmlhttp://www.redhat.com/support/errata/RHSA-2011-0307.htmlhttp://support.apple.com/kb/HT4581http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.htmlhttp://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.htmlhttp://lists.opensuse.org/opensuse-updates/2011-05/msg00000.htmlhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599833https://usn.ubuntu.com/1069-1/https://nvd.nist.gov