Описание
Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1:2.1.23-1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1:2.1.16-2ubuntu0.2]] |
esm-infra/xenial | not-affected | 1:2.1.20-1ubuntu0.1 |
precise | released | 1:2.1.14-3ubuntu0.4 |
trusty | released | 1:2.1.16-2ubuntu0.2 |
trusty/esm | DNE | trusty was released [1:2.1.16-2ubuntu0.2] |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | released | 1:2.1.20-1ubuntu0.1 |
Показывать по
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.
Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.
Cross-site request forgery (CSRF) vulnerability in the user options pa ...
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3