Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks if Mailman filters invalid chars from PATH_INFO
Detailed Explanation for this Vulnerability Assessment
The remote web server contains a Python application that is affected
by a log spoofing vulnerability.
The version of Mailman installed on the remote host fails to sanitize
user-supplied input before writing it to the application's 'error'
log. An unauthenticated remote attacker can leverage this flaw to
spoof log messages.
In addition, the application reportedly is affected by a denial of
service issue involving headers that do not conform to RFC 2231 as
well as several cross-site scripting vulnerabilities.
See also :
Upgrade to Mailman version 2.1.9 rc1 or later.
Network Security Threat Level:
Low / CVSS Base Score : 2
Networks Security ID: 19831, 20021
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
No Discussions have been posted on this vulnerability.