4.3
CVSSv2

CVE-2020-29668

Published: 10/12/2020 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 3.7 | Impact Score: 1.4 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Sympa prior to 6.2.59b.2 allows remote malicious users to obtain full SOAP API access by sending any arbitrary string (except one from an expired cookie) as the cookie value to authenticateAndRun.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sympa sympa 6.2.59

sympa sympa

fedoraproject fedora 32

fedoraproject fedora 33

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #976020 sympa: CVE-2020-29668: Unauthorized access to review call of the SOAP API Package: sympa; Maintainer for sympa is Debian Sympa team <sympa@packagesdebianorg>; Source for sympa is src:sympa (PTS, buildd, popcon) Reported by: "Stefan Hornburg (Racke)" <racke@linuxiade> Date: Sat, 28 ...
Several vulnerabilities were discovered in Sympa, a mailing list manager, which could result in local privilege escalation, denial of service or unauthorized access via the SOAP API Additionally to mitigate CVE-2020-26880 the sympa_newaliases-wrapper is no longer installed setuid root by default A new Debconf question is introduced to allow setui ...