Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-2775

Опубликовано: 31 мар. 2015
Источник: redhat
CVSS2: 4.6
EPSS Низкий

Описание

Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.

It was found that mailman did not sanitize the list name before passing it to certain MTAs. A local attacker could use this flaw to execute arbitrary code as the user running mailman.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5mailmanWill not fix
Red Hat Enterprise Linux 6mailmanFixedRHSA-2015:141720.07.2015
Red Hat Enterprise Linux 7mailmanFixedRHSA-2015:115323.06.2015

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1208059mailman: directory traversal in MTA transports that deliver programmatically

EPSS

Процентиль: 87%
0.03235
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.

nvd
больше 10 лет назад

Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.

debian
больше 10 лет назад

Directory traversal vulnerability in GNU Mailman before 2.1.20, when n ...

github
больше 3 лет назад

Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.

oracle-oval
около 10 лет назад

ELSA-2015-1153: mailman security and bug fix update (MODERATE)

EPSS

Процентиль: 87%
0.03235
Низкий

4.6 Medium

CVSS2