vulnerability
CentOS Linux: CVE-2020-12137: Moderate: mailman:2.1 security and bug fix update (CESA-2020:4667)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Apr 24, 2020 | Nov 5, 2020 | May 25, 2023 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Apr 24, 2020
Added
Nov 5, 2020
Modified
May 25, 2023
Description
GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code.
Solution(s)
centos-upgrade-mailmancentos-upgrade-mailman-debuginfocentos-upgrade-mailman-debugsource
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.