Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Mailman Log Spoofing Vulnerability

Vulnerability Assessment Details

Mailman Log Spoofing Vulnerability

Vulnerability Assessment Summary
Checks if Mailman filters invalid chars from PATH_INFO

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a Python application that is affected
by a log spoofing vulnerability.

Description :

The version of Mailman installed on the remote host fails to sanitize
user-supplied input before writing it to the application's 'error'
log. An unauthenticated remote attacker can leverage this flaw to
spoof log messages.

In addition, the application reportedly is affected by a denial of
service issue involving headers that do not conform to RFC 2231 as
well as several cross-site scripting vulnerabilities.

See also :

Solution :

Upgrade to Mailman version 2.1.9 rc1 or later.

Network Security Threat Level:

Low / CVSS Base Score : 2

Networks Security ID: 19831, 20021

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors


No Discussions have been posted on this vulnerability.