Mailman subscription option cross-site scripting

mailman-subscription-option-xss (9985) The risk level is classified as MediumMedium Risk

Description:

GNU Mailman is vulnerable to cross-site scripting in the list subscription options. A remote attacker could create a specially-crafted link containing malicious script to one of the mailing list subscription scripts, which would be executed in the victim's Web browser within the security context of the hosting site, once the link is clicked.


Consequences:

Gain Access

Remedy:

Upgrade to the latest version of Mailman (2.0.13 or later), available from the Mailman Web page. See References.

For Red Hat Linux 7.2 and 7.3:
Upgrade to the latest version of Mailman (2.0.13-1 or later), as listed in RHSA-2002:176-06. See References.

For Red Hat Powertools 7.0:
Upgrade to the latest version of Mailman (2.0.13-0.7.0 or later), RHSA-2002:177-05. See References.

For Red Hat Powertools 7.1:
Upgrade to the latest version of Mailman (2.0.13-1 or later), RHSA-2002:177-05. See References.

For Red Hat Secure Web Server 3.2:
Refer to RHSA-2002:178-04 for instructions on obtaining an upgrade. See References.

For Conectiva Linux: 6.0:
Upgrade to the mailman package (2.0.13-1U60_1cl or later), as listed in Conectiva Linux Announcement CLSA-2002:522. See References.

For Conectiva Linux: 7.0:
Upgrade to the mailman package (2.0.13-1U70_1cl or later), as listed in Conectiva Linux Announcement CLSA-2002:522. See References.

For Conectiva Linux: 8.0:
Upgrade to the mailman package (2.0.13-1U80_1cl or later), as listed in Conectiva Linux Announcement CLSA-2002:522. See References.

For other distributions:
Contact your vendor for upgrade or patch information.

References:

Platforms Affected:

  • Conectiva Linux 6.0
  • Conectiva Linux 7.0
  • Conectiva Linux 8.0
  • Debian Debian Linux 2.2
  • Debian Debian Linux 3.0
  • GNU Mailman 1.0
  • GNU Mailman 1.1
  • GNU Mailman 2.0 Beta4
  • GNU Mailman 2.0 Beta5
  • GNU Mailman 2.0 Beta3
  • GNU Mailman 2.0
  • GNU Mailman 2.0.1
  • GNU Mailman 2.0.10
  • GNU Mailman 2.0.11
  • GNU Mailman 2.0.2
  • GNU Mailman 2.0.3
  • GNU Mailman 2.0.4
  • GNU Mailman 2.0.5
  • GNU Mailman 2.0.6
  • GNU Mailman 2.0.7
  • GNU Mailman 2.0.8
  • GNU Mailman 2.0.9
  • RedHat Enterprise Linux 2.1 AS
  • RedHat Linux 7
  • RedHat Linux 7.1
  • RedHat Linux 7.2
  • RedHat Linux 7.3
  • RedHat Linux Powertools 7.0
  • RedHat Linux Powertools 7.1
  • RedHat Secure Web Server 3.2

Reported:

Jul 11, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page