QID 353123
Date Published: 2022-02-01
QID 353123: Amazon Linux Security Advisory for mailman : ALAS2-2022-1740
Cross-site request forgery (csrf) vulnerability in the user options page in gnu mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account. (
( CVE-2016-6893) a cross-site request forgery (csrf) attack can be performed in mailman due to a csrf token bypass.
Csrf tokens are not checked against the right user and a token created by one user can be used by another one to perform a request, effectively bypassing the protection provided by csrf tokens.
A remote attacker with an account on the mailman system can use this flaw to perform a csrf attack and perform operations on behalf of the victim user. (
( CVE-2021-42097) a cross-site request forgery (csrf) attack can be performed in mailman due to a csrf token bypass.
Csrf tokens are not checked against the right type of user when performing admin operations and a token created by a regular user can be used by an admin to perform an admin-level request, effectively bypassing the protection provided by csrf tokens.
A remote attacker with an account on the mailman system can use this flaw to perform a csrf attack and perform operations on behalf of the victim admin. (
( CVE-2021-44227)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2-2022-1740 -
alas.aws.amazon.com/AL2/ALAS-2022-1740.html
CVEs related to QID 353123
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2-2022-1740 | Amazon Linux 2 |
|