CVE-2021-43332
Summary
| CVE | CVE-2021-43332 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-11-12 21:15:00 UTC |
| Updated | 2023-11-07 03:39:00 UTC |
| Description | In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] [DLA 3049-1] mailman security update |
MLIST |
lists.debian.org |
|
| Mailman 3
[Mailman-Announce] Mailman 2.1 security release - Mailman-announce - python.org |
|
mail.python.org |
|
| Mailman 3
[Mailman-Announce] Mailman 2.1 security release - Mailman-announce - python.org |
CONFIRM |
mail.python.org |
|
| Bug #1949403 “A vulnerability could allow a list moderator to di...” : Bugs : GNU Mailman |
MISC |
bugs.launchpad.net |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 179367 Debian Security Update for mailman (DLA 3049-1)
- 180119 Debian Security Update for mailman (CVE-2021-43332)
- 198575 Ubuntu Security Notification for Mailman Vulnerabilities (USN-5151-1)
- 296061 Oracle Solaris 11.4 Support Repository Update (SRU) 42.113.1 Missing (CPUJAN2022)
- 356762 Amazon Linux Security Advisory for mailman : ALAS2-2023-2370
- 671709 EulerOS Security Update for mailman (EulerOS-SA-2022-1745)
- 690238 Free Berkeley Software Distribution (FreeBSD) Security Update for mailman (9d7a2b54-4468-11ec-8532-0d24c37c72c8)
- 752189 SUSE Enterprise Linux Security Update for mailman (SUSE-SU-2022:1886-1)