4.3
CVSSv2

CVE-2011-0707

Published: 22/02/2011 Updated: 13/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and previous versions allow remote malicious users to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu mailman 2.1.13

gnu mailman 2.1.5

gnu mailman 2.1.11

gnu mailman 2.0.5

gnu mailman 2.0.1

gnu mailman 2.1.5.8

gnu mailman 2.1.3

gnu mailman 2.0.11

gnu mailman 2.0.6

gnu mailman 2.0

gnu mailman 2.1.8

gnu mailman 1.1

gnu mailman 2.0.14

gnu mailman 2.0.12

gnu mailman 2.1.2

gnu mailman 2.0.9

gnu mailman 2.1.9

gnu mailman 2.0.3

gnu mailman 2.1

gnu mailman 2.1.14

gnu mailman 2.0.13

gnu mailman 2.1.6

gnu mailman 2.0.4

gnu mailman 2.1b1

gnu mailman

gnu mailman 2.1.10

gnu mailman 2.1.1

gnu mailman 2.1.12

gnu mailman 1.0

gnu mailman 2.0.8

gnu mailman 2.1.7

gnu mailman 2.1.4

gnu mailman 2.0.10

gnu mailman 2.0.2

gnu mailman 2.0.7

Vendor Advisories

It was discovered that Mailman did not properly sanitize certain fields, resulting in cross-site scripting (XSS) vulnerabilities With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, withi ...
Two cross site scripting vulnerabilities were been discovered in Mailman, a web-based mailing list manager These allowed an attacker to retrieve session cookies via inserting crafted JavaScript into confirmation messages (CVE-2011-0707) and in the list admin interface (CVE-2010-3089; oldstable only) For the oldstable distribution (lenny), these p ...

References

CWE-79http://www.debian.org/security/2011/dsa-2170http://mail.python.org/pipermail/mailman-announce/2011-February/000158.htmlhttp://secunia.com/advisories/43294http://www.securityfocus.com/bid/46464http://secunia.com/advisories/43389http://www.vupen.com/english/advisories/2011/0435http://www.vupen.com/english/advisories/2011/0436http://mail.python.org/pipermail/mailman-announce/2011-February/000157.htmlhttp://secunia.com/advisories/43425http://www.mandriva.com/security/advisories?name=MDVSA-2011:036http://www.vupen.com/english/advisories/2011/0460http://www.securitytracker.com/id?1025106http://www.ubuntu.com/usn/USN-1069-1http://www.vupen.com/english/advisories/2011/0487http://osvdb.org/70936http://secunia.com/advisories/43580http://secunia.com/advisories/43549http://www.redhat.com/support/errata/RHSA-2011-0308.htmlhttp://www.vupen.com/english/advisories/2011/0542http://www.redhat.com/support/errata/RHSA-2011-0307.htmlhttp://secunia.com/advisories/43829http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056363.htmlhttp://www.vupen.com/english/advisories/2011/0720http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056387.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2011-March/056399.htmlhttp://support.apple.com/kb/HT5002http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlhttp://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.htmlhttp://lists.opensuse.org/opensuse-updates/2011-05/msg00000.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/65538https://usn.ubuntu.com/1069-1/https://nvd.nist.gov