SB2021103004 - openEuler update for mailman
Published: October 30, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Spoofing attack (CVE-ID: CVE-2020-12108)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data when processing email addresses. A remote attacker can create a specially crafted email and spoof content of email message.
2) Stored cross-site scripting (CVE-ID: CVE-2020-12137)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to mailman uses the .obj extension for scrubbed application/octet-stream MIME parts. A remote attacker can send a specially crafted attachment to the list, trick the victim to open the email in the list archive and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Code Injection (CVE-ID: CVE-2020-15011)
The vulnerability allows a remote attacker to inject arbitrary content.
The vulnerability exists due to improper input validation within the Cgi/private.py private archive login page. A remote attacker can send a specially crafted request and inject arbitrary content.
Successful exploitation of the vulnerability requires that the roster visibility (private_roster) setting is 'Anyone'.
4) Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (CVE-ID: CVE-2021-42096)
The vulnerability allows a remote attacker to brute-force the administrative password.
The vulnerability exists due to a certain csrf_token value is derived from the admin password. A remote attacker can conduct a brute-force attack against that password and gain unauthorized access to the application.
5) Cross-site request forgery (CVE-ID: CVE-2021-42097)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and take over the admin account, as the csrf_token value is not specific to a single user account.
Remediation
Install update from vendor's website.