Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via …/…./// sequences, which are not properly cleansed by regular expressions that are intended to remove ../ and ./ sequences.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mailman | Gnu | 2.1 (including) | 2.1 (including) |
Mailman | Gnu | 2.1.1 (including) | 2.1.1 (including) |
Mailman | Gnu | 2.1.2 (including) | 2.1.2 (including) |
Mailman | Gnu | 2.1.3 (including) | 2.1.3 (including) |
Mailman | Gnu | 2.1.4 (including) | 2.1.4 (including) |
Mailman | Gnu | 2.1.5 (including) | 2.1.5 (including) |
Mailman | Gnu | 2.1b1 (including) | 2.1b1 (including) |
Red Hat Enterprise Linux 3 | RedHat | mailman-3:2.1.5-24.rhel3 | * |
Red Hat Enterprise Linux 4 | RedHat | mailman-3:2.1.5-31.rhel4 | * |
Mailman | Ubuntu | dapper | * |
Mailman | Ubuntu | devel | * |
Mailman | Ubuntu | edgy | * |
Mailman | Ubuntu | feisty | * |