5.5
CVSSv2

CVE-2021-40347

Published: 10/09/2021 Updated: 24/09/2021
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 5.4 | Impact Score: 2.5 | Exploitability Score: 2.8
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N

Vulnerability Summary

An issue exists in views/list.py in GNU Mailman Postorius prior to 1.3.5. An attacker (logged into any account) can send a crafted POST request to unsubscribe any user from a mailing list, also revealing whether that address was subscribed in the first place.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

postorius project postorius

Vendor Advisories

Debian Bug report logs - #993746 python3-django-postorius: CVE-2021-40347 New upstream to fix security bug Package: src:134-2; Maintainer for src:134-2 is (unknown); Reported by: Peter Chubb <peterchubb@unsweduau> Date: Sun, 5 Sep 2021 21:33:01 UTC Severity: important Tags: fixed-upstream, security, upstream Found ...
Kevin Israel discovered that Postorius, the administrative web frontend for Mailman 3, didn't validate whether a logged-in user owns the email address when unsubscribing For the oldstable distribution (buster), this problem has been fixed in version 124-1+deb10u1 For the stable distribution (bullseye), this problem has been fixed in version 13 ...
An issue was discovered in views/listpy in GNU Mailman Postorius before 135 An attacker (logged into any account) can send a crafted POST request to unsubscribe any user from a mailing list, also revealing whether that address was subscribed in the first place ...