Login
Newsletter
Werbung

Sicherheit: Cross-Site Request Forgery in Mailman
Aktuelle Meldungen Distributionen
Name: Cross-Site Request Forgery in Mailman
ID: USN-5180-1
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS
Datum: Mi, 8. Dezember 2021, 09:12
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44227
Applikationen: MailMan

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============2682518220477526147==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="lQo0F6mnVTbhDecPQa9VubBOXJkRr5Lx5"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--lQo0F6mnVTbhDecPQa9VubBOXJkRr5Lx5
Content-Type: multipart/mixed;
boundary="bbqXYxOuSp8jFbtm7jYEQEeI4YDZuaV8c";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <2b04f064-dc9b-e501-debc-f11052e559c2@canonical.com>
Subject: [USN-5180-1] Mailman vulnerability

--bbqXYxOuSp8jFbtm7jYEQEeI4YDZuaV8c
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-5180-1
December 07, 2021

mailman vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

A system hardening measure could be bypassed.

Software Description:
- mailman: Web-based mailing list manager

Details:

It was discovered that Mailman incorrectly handled CSRF tokens. A remote
list member or moderator could possibly use their own token to craft an
admin request CSRF attack and set a new admin password or make other
changes.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
mailman 1:2.1.26-1ubuntu0.6

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5180-1
CVE-2021-44227

Package Information:
https://launchpad.net/ubuntu/+source/mailman/1:2.1.26-1ubuntu0.6


--bbqXYxOuSp8jFbtm7jYEQEeI4YDZuaV8c--

--lQo0F6mnVTbhDecPQa9VubBOXJkRr5Lx5
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=IrmW
-----END PGP SIGNATURE-----

--lQo0F6mnVTbhDecPQa9VubBOXJkRr5Lx5--


--===============2682518220477526147==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============2682518220477526147==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung