RE: Mailman: cross-site scripting bug

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hmm...

https://workserver//mailman/options/ak3barons?language=<SCRIPT>ale
rt('Can%20Cross%20Site%20Attack')</SCRIPT>

returns:

<h2>Error</h2><strong>Invalid options to CGI script.</strong>

2.0.11 doesn't seem to be vulnerable to this.

(although it's got some other issues, but nothing serious for an
internal site..)

> -----Original Message-----
> From: webmaster@procheckup.com [mailto:webmaster@procheckup.com]
> Sent: Friday, January 24, 2003 5:35 AM
> To: bugtraq@securityfocus.com
> Subject: Mailman: cross-site scripting bug
> 
> 
> 
> 
> Product: Mailman
> Affected Version: 2.1 not other version has been tested
> Vendor's URL: http://www.gnu.org/software/mailman/
> Solution: TBC
> Author: Manuel Rodriguez
> 
> Introduction:
> ------------
> Mailman is software to help manage electronic mail discussion 
> lists, much 
> like Majordomo or Smartmail.  And Mailman have web interface systems.
> 
> 
> Example:
> -----------------
> This is a simple example for version 2.1:
> 
> 1) With mailman options the email variable is vulnerable to 
> cross-site 
> scripting.
> 
> You can recognise the vulnerabilities with this type of URL:
> 
> https://www.yourserver.com:443/mailman/options/yourlist?
> language=en&email=&lt;SCRIPT&gt;alert('Can%20Cross%20Site%20At
> tack')&lt;/SCRIPT&gt; 
> and that prove that any (malicious) script code is possible on web 
> interface part of Mailman.
> 
> 2) The default error page mailman generates does not 
> adequately filter its 
> input making it susceptible to cross-site scripting.
> 
> https://www.yourserver.com:443//mailman/options/yourlist?
> language=&lt;SCRIPT&gt;alert('Can%20Cross%20Site%20Attack')&lt
> ;/SCRIPT&gt;
> 

Attachment: smime.p7s
Description: application/pkcs7-signature


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux