Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-42097

Опубликовано: 21 окт. 2021
Источник: redhat
CVSS3: 8
EPSS Низкий

Описание

GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).

A Cross-Site Request Forgery (CSRF) attack can be performed in mailman due to a CSRF token bypass. CSRF tokens are not checked against the right user and a token created by one user can be used by another one to perform a request, effectively bypassing the protection provided by CSRF tokens. A remote attacker with an account on the mailman system can use this flaw to perform a CSRF attack and perform operations on behalf of the victim user.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6mailmanOut of support scope
Red Hat Enterprise Linux 7mailmanFixedRHSA-2021:491302.12.2021
Red Hat Enterprise Linux 8mailmanFixedRHSA-2021:482623.11.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportmailmanFixedRHSA-2021:483824.11.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportmailmanFixedRHSA-2021:483724.11.2021
Red Hat Enterprise Linux 8.4 Extended Update SupportmailmanFixedRHSA-2021:483924.11.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-352
https://bugzilla.redhat.com/show_bug.cgi?id=2020568mailman: CSRF token bypass allows to perform CSRF attacks and account takeover

EPSS

Процентиль: 78%
0.01214
Низкий

8 High

CVSS3

Связанные уязвимости

CVSS3: 8
ubuntu
больше 3 лет назад

GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).

CVSS3: 8
nvd
больше 3 лет назад

GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).

CVSS3: 8
debian
больше 3 лет назад

GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csr ...

github
около 3 лет назад

GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).

suse-cvrf
больше 3 лет назад

Security update for mailman

EPSS

Процентиль: 78%
0.01214
Низкий

8 High

CVSS3