5
CVSSv2

CVE-2021-33038

Published: 26/05/2021 Updated: 04/06/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

An issue exists in management/commands/hyperkitty_import.py in HyperKitty up to and including 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

hyperkitty project hyperkitty

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #989183 CVE-2021-33038 Package: src:hyperkitty; Maintainer for src:hyperkitty is Debian Mailman Team <pkg-mailman-hackers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Thu, 27 May 2021 19:12:02 UTC Severity: grave Tags: security, upstream Found in version h ...
Amir Sarabadani and Kunal Mehta discovered that the import functionality of Hyperkitty, the web user interface to access Mailman 3 archives, did not restrict the visibility of private archives during the import, ie that during the import of a private Mailman 2 archive the archive was publicly accessible until the import completed For the stable ...
An issue was discovered in management/commands/hyperkitty_importpy in HyperKitty through 134 When importing a private mailing list's archives, these archives are publicly visible for the duration of the import For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3 ...