8.5
CVSSv2

CVE-2021-42097

Published: 21/10/2021 Updated: 07/11/2023
CVSS v2 Base Score: 8.5 | Impact Score: 10 | Exploitability Score: 6.8
CVSS v3 Base Score: 8 | Impact Score: 5.9 | Exploitability Score: 2.1
VMScore: 756
Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

GNU Mailman prior to 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu mailman

debian debian linux 10.0

Vendor Advisories

Several vulnerabilities were discovered in mailman, a web-based mailing list manager, which could result in arbitrary content injection via the options and private archive login pages, and CSRF attacks or privilege escalation via the user options page For the oldstable distribution (buster), these problems have been fixed in version 1:2129-1+deb ...
Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 21x before 2123 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account (CVE-2016-6893) A Cross-Site Request Forgery (CSRF) attack ...
A Cross-Site Request Forgery (CSRF) attack can be performed in mailman due to a CSRF token bypass CSRF tokens are not checked against the right user and a token created by one user can be used by another one to perform a request, effectively bypassing the protection provided by CSRF tokens A remote attacker with an account on the mailman system c ...
GNU Mailman before 2135 may allow remote privilege escalation A csrf_token value is not specific to a single user account An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (eg, for account takeover) ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Mailman 2135 security release <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Alan Coopersmith &lt;alancoopers ...