|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Remote file access >> Mailman private.py Directory Traversal Vulnerability Vulnerability Assessment Details
|
Mailman private.py Directory Traversal Vulnerability |
||
Checks for Mailman private.py Directory Traversal Vulnerability Detailed Explanation for this Vulnerability Assessment Summary : Authenticated Mailman users can view arbitrary files on the remote host. Description : According to its version number, the remote installation of Mailman reportedly is prone to a directory traversal vulnerability in 'Cgi/private.py'. The flaw comes into play only on web servers that don't strip extraneous slashes from URLs, such as Apache 1.3.x, and permits a list subscriber, using a specially crafted web request, to retrieve arbitrary files from the server - any file accessible by the user under which the web server operates, including email addresses and passwords of subscribers of any lists hosted on the server. For example, if '$user' and '$pass' identify a subscriber of the list '$listname@$target', then the following URL : http://$target/mailman/private/$listname/.../....///mailman?username=$user&password=$pass permits access to archives for the mailing list named 'mailman' for which the user might not otherwise be entitled. See also : http://mail.python.org/pipermail/mailman-announce/2005-February/000076.html http://lists.netsys.com/pipermail/full-disclosure/2005-February/031562.html Solution : Upgrade to Mailman 2.1.6b1 or apply the fix referenced in the first URL above. Network Security Threat Level: Low / CVSS Base Score : 2 (AV:R/AC:H/Au:R/C:P/A:N/I:N/B:C) Networks Security ID: 12504 Vulnerability Assessment Copyright: This script is Copyright (C) 2005 George A. Theall |
||
Cables, Connectors |
Dell PowerEdge R720 Server - 2x8c CPU,256Gb RAM, 128Gb SSD/3x600Gb SAS, Proxmox
$340.00
Dell PowerEdge R720XD Xeon E5-2680 V2 2.8GHz 20 Cores 256GB RAM 12x4TB
$510.00
DELL PowerEdge R730 Server 2x E5-2690v3 2.6GHz =24 Cores 32GB H730 4xRJ45
$275.00
Dell PowerEdge R730XD 28 Core Server 2X Xeon E5-2680 V4 H730 128GB RAM No HDD
$389.99
Dell PowerEdge R620 Server 2x Xeon E5-2620 @ 2.0GHz 64GB RAM NO HDDs
$108.96
Dell PowerEdge R730, 2 sinks, SystemBoard, 8 trays,H330,Idrac 8 exp, 2x750w Psu
$135.00
Dell PowerEdge R620 Dual Intel Xeon E5-2660 2.20GHz 64GB RAM No HDD H310
$124.50
Dell R730xd 26 Port SFF 2x E5-2690v4 28-Cores H730 128GB Server 2x SFP 2x RJ-45
$390.00
Dell PowerEdge R430 3.5 1U 2x E5-2690 v3 2.6ghz 24-Cores 256gb 4x Trays 2x 550w
$289.99
DELL PowerEdge R630 8SFF Server 2x E5-2690v4 2.6GHz =28 Cores 128GB H730 4xRJ45
$444.00
|
||
No Discussions have been posted on this vulnerability. |