Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-34337

Опубликовано: 15 апр. 2023
Источник: ubuntu
Приоритет: medium
CVSS3: 6.3

Описание

An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

3.3.7-1
esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/noble

not-affected

3.3.7-1
focal

ignored

end of standard support, was needed
impish

ignored

end of life
jammy

DNE

kinetic

DNE

lunar

not-affected

3.3.7-1

Показывать по

Ссылки на источники

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.4
redhat
около 4 лет назад

An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.

CVSS3: 6.3
nvd
почти 3 года назад

An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.

CVSS3: 6.3
debian
почти 3 года назад

An issue was discovered in Mailman Core before 3.3.5. An attacker with ...

CVSS3: 6.3
github
почти 3 года назад

Mailman Core vulnerable to timing attacks

6.3 Medium

CVSS3