Описание
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
Ссылки
- Issue TrackingMailing ListPatchThird Party Advisory
- Mailing ListThird Party Advisory
- Issue TrackingMailing ListPatchThird Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.1.38 (исключая)
cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
EPSS
Процентиль: 56%
0.00339
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-352
Связанные уязвимости
CVSS3: 8.8
ubuntu
больше 3 лет назад
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
CVSS3: 8
redhat
больше 3 лет назад
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
CVSS3: 8.8
debian
больше 3 лет назад
In GNU Mailman before 2.1.38, a list member or moderator can get a CSR ...
EPSS
Процентиль: 56%
0.00339
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-352