Описание
In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.
A flaw was found in mailman in the Cgi/options.py user options page. This flaw allows a malicious attacker to carry out a Cross-site Scripting attack by providing a crafted URL as input, leading to the execution of arbitrary JavaScript code. The highest threat from this vulnerability is confidentiality and integrity.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 6 | mailman | Out of support scope | ||
| Red Hat Enterprise Linux 7 | mailman | Out of support scope | ||
| Red Hat Enterprise Linux 8 | mailman | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
6.1 Medium
CVSS3
Связанные уязвимости
In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.
In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.
In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user ...
In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.
Уязвимость параметров cgi/options.pyв пакета для управления рассылками электронных писем GNU Mailman, связанная с непринятием мер по защите структуры веб-страницы, позволяющая выполнить произвольный JavaScript-код
EPSS
6.1 Medium
CVSS3