Sympa before 6.2.59b.2 allows remote attackers to obtain full SOAP API access by sending any arbitrary string (except one from an expired cookie) as the cookie value to authenticateAndRun.
References
Link | Resource |
---|---|
https://github.com/sympa-community/sympa/blob/6.2.59b.2/NEWS.md | Release Notes Third Party Advisory |
https://github.com/sympa-community/sympa/issues/1041 | Exploit Patch Third Party Advisory |
https://github.com/sympa-community/sympa/pull/1044 | Patch Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976020 | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/12/msg00026.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2020/dsa-4818 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JICIHAJKKCZXJNIICUDYXGZFQCN6J4U6/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFZWDEKQFW3EH665OECDWIWM2MI7T53Y/ | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2020-12-10 00:15
Updated : 2022-04-26 09:12
NVD link : CVE-2020-29668
Mitre link : CVE-2020-29668
JSON object : View
CWE
Products Affected
debian
- debian_linux
sympa
- sympa
fedoraproject
- fedora