GNU Mailman CVE-2018-5950 Cross Site Scripting Vulnerability
BID:104594
CVE-2018-5950 |Info
GNU Mailman CVE-2018-5950 Cross Site Scripting Vulnerability
| Bugtraq ID: | 104594 |
| Class: | Input Validation Error |
| CVE: |
CVE-2018-5950 |
| Remote: | Yes |
| Local: | No |
| Published: | Jul 03 2018 12:00AM |
| Updated: | Jul 03 2018 12:00AM |
| Credit: | Salvatore Bonaccorso |
| Vulnerable: |
Redhat Enterprise Linux 7 Redhat Enterprise Linux 6 Redhat Enterprise Linux 5 GNU Mailman 2.1.25 GNU Mailman 2.1.24 GNU Mailman 2.1.22 GNU Mailman 2.1.20 GNU Mailman 2.1.19 GNU Mailman 2.1.18 GNU Mailman 2.1.17 GNU Mailman 2.1.16 GNU Mailman 2.1.15 GNU Mailman 2.1.12 GNU Mailman 2.1.11 GNU Mailman 2.1.10 b1 GNU Mailman 2.1.9 rc1 GNU Mailman 2.1.9 GNU Mailman 2.1.8 rc1 GNU Mailman 2.1.7 GNU Mailman 2.1.6 GNU Mailman 2.1.5 GNU Mailman 2.1.4 GNU Mailman 2.1.3 GNU Mailman 2.1.2 GNU Mailman 2.1.1 GNU Mailman 2.1 GNU Mailman 2.0.14 GNU Mailman 2.0.13 GNU Mailman 2.0.12 GNU Mailman 2.0.11 GNU Mailman 2.0.10 GNU Mailman 2.0.9 GNU Mailman 2.0.8 GNU Mailman 2.0.7 GNU Mailman 2.0.6 GNU Mailman 2.0.5 GNU Mailman 2.0.4 GNU Mailman 2.0.3 GNU Mailman 2.0.2 GNU Mailman 2.0.1 GNU Mailman 2.1.23 GNU Mailman 2.1.14rc1 GNU Mailman 2.1.14 Rc1 GNU Mailman 2.1.14 GNU Mailman 2.1.13 Rc1 GNU Mailman 2.1.13 GNU Mailman 2.1.11 Rc2 GNU Mailman 2.1.11 Rc1 GNU Mailman 2.1.10b1 GNU Mailman 2.1.10 GNU Mailman 2.1 Stable GNU Mailman 2.1 Beta GNU Mailman 2.1 Alpha |
| Not Vulnerable: |
GNU Mailman 2.1.26 |
Discussion
GNU Mailman CVE-2018-5950 Cross Site Scripting Vulnerability
GNU Mailman is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Versions prior to GNU Mailman 2.1.26 are vulnerable.
GNU Mailman is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Versions prior to GNU Mailman 2.1.26 are vulnerable.
Exploit / POC
GNU Mailman CVE-2018-5950 Cross Site Scripting Vulnerability
Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.
Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.
Solution / Fix
GNU Mailman CVE-2018-5950 Cross Site Scripting Vulnerability
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Solution:
Updates are available. Please see the references or vendor advisory for more information.
References
GNU Mailman CVE-2018-5950 Cross Site Scripting Vulnerability
References:
References:
- Bug 1537941 - (CVE-2018-5950) CVE-2018-5950 mailman: Cross-site scripting (XSS) (Red Hat Bugzilla)
- CVE-2018-5950 (Red Hat Bugzilla)
- Mailman - Homepage (GNU Mailman)
- mailman: CVE-2018-5950 (Debian)
- RHSA-2018:0504 - Security Advisory (Red Hat)
- RHSA-2018:0505 - Security Advisory (Red Hat)