GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password.
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mailman | Gnu | * | 2.1.35 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | mailman:2.1-8050020211109091611.aa3ced04 | * |
Red Hat Enterprise Linux 8.1 Extended Update Support | RedHat | mailman:2.1-8010020211110115755.656b880e | * |
Red Hat Enterprise Linux 8.2 Extended Update Support | RedHat | mailman:2.1-8020020211110111201.c3a0935b | * |
Red Hat Enterprise Linux 8.4 Extended Update Support | RedHat | mailman:2.1-8040020211109094506.70584597 | * |
Mailman | Ubuntu | bionic | * |
Mailman | Ubuntu | esm-apps/focal | * |
Mailman | Ubuntu | esm-infra/bionic | * |
Mailman | Ubuntu | esm-infra/xenial | * |
Mailman | Ubuntu | focal | * |
Mailman | Ubuntu | upstream | * |
Common protection mechanisms include:
Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482].
Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]