An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
References
Link | Resource |
---|---|
https://gitlab.com/mailman/hyperkitty/-/issues/380 | Exploit Issue Tracking Patch Third Party Advisory |
https://gitlab.com/mailman/hyperkitty/-/commit/9025324597d60b2dff740e49b70b15589d6804fa | Patch Third Party Advisory |
https://www.debian.org/security/2021/dsa-4922 | Third Party Advisory |
https://techblog.wikimedia.org/2021/06/11/discovering-and-fixing-cve-2021-33038-in-mailman3/ | Patch Third Party Advisory |
Information
Published : 2021-05-26 07:15
Updated : 2022-06-03 18:22
NVD link : CVE-2021-33038
Mitre link : CVE-2021-33038
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
debian
- debian_linux
hyperkitty_project
- hyperkitty