vulnerability
FreeBSD: VID-8D65AA3B-31CE-11EC-8C32-A14E8E520DC7 (CVE-2021-42097): mailman -- brute-force vuln on list admin password, and CSRF vuln in releases before 2.1.35
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:M/Au:S/C:C/I:C/A:C) | 2021-10-18 | 2022-11-04 | 2022-11-04 |
Severity
9
CVSS
(AV:N/AC:M/Au:S/C:C/I:C/A:C)
Published
2021-10-18
Added
2022-11-04
Modified
2022-11-04
Description
GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).
Solution(s)
freebsd-upgrade-package-mailmanfreebsd-upgrade-package-mailman-with-htdig

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.