Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-2775

Опубликовано: 31 мар. 2015
Источник: redhat
CVSS2: 4.6
EPSS Средний

Описание

Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.

It was found that mailman did not sanitize the list name before passing it to certain MTAs. A local attacker could use this flaw to execute arbitrary code as the user running mailman.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5mailmanWill not fix
Red Hat Enterprise Linux 6mailmanFixedRHSA-2015:141720.07.2015
Red Hat Enterprise Linux 7mailmanFixedRHSA-2015:115323.06.2015

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1208059mailman: directory traversal in MTA transports that deliver programmatically

EPSS

Процентиль: 93%
0.10677
Средний

4.6 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.

nvd
около 10 лет назад

Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.

debian
около 10 лет назад

Directory traversal vulnerability in GNU Mailman before 2.1.20, when n ...

github
около 3 лет назад

Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.

oracle-oval
почти 10 лет назад

ELSA-2015-1153: mailman security and bug fix update (MODERATE)

EPSS

Процентиль: 93%
0.10677
Средний

4.6 Medium

CVSS2

Уязвимость CVE-2015-2775