Описание
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
Ссылки
- Issue TrackingMailing ListPatchThird Party Advisory
- Mailing ListThird Party Advisory
- Issue TrackingMailing ListPatchThird Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.1.38 (исключая)
cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
EPSS
Процентиль: 49%
0.00259
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-352
Связанные уязвимости
CVSS3: 8.8
ubuntu
почти 4 года назад
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
CVSS3: 8
redhat
около 4 лет назад
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
CVSS3: 8.8
debian
почти 4 года назад
In GNU Mailman before 2.1.38, a list member or moderator can get a CSR ...
EPSS
Процентиль: 49%
0.00259
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-352