Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.
References
Link | Resource |
---|---|
https://www.mail-archive.com/mailman-users@python.org/msg70375.html | Patch Third Party Advisory |
https://bugs.launchpad.net/mailman/+bug/1747209 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/02/msg00007.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2018/dsa-4108 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:0505 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:0504 | Third Party Advisory |
https://usn.ubuntu.com/3563-1/ | Third Party Advisory |
http://www.securityfocus.com/bid/104594 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/159761/Mailman-2.1.23-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2018-01-23 08:29
Updated : 2020-11-10 11:39
NVD link : CVE-2018-5950
Mitre link : CVE-2018-5950
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_tus
- enterprise_linux_server_eus
- enterprise_linux_server
canonical
- ubuntu_linux
debian
- debian_linux
gnu
- mailman