CVE Vulnerabilities

CVE-2021-42096

Improper Restriction of Excessive Authentication Attempts

Published: Oct 21, 2021 | Modified: Nov 07, 2023
CVSS 3.x
4.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:P/I:N/A:N
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Ubuntu
HIGH

GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password.

Weakness

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks.

Affected Software

Name Vendor Start Version End Version
Mailman Gnu * 2.1.35 (excluding)
Red Hat Enterprise Linux 8 RedHat mailman:2.1-8050020211109091611.aa3ced04 *
Red Hat Enterprise Linux 8.1 Extended Update Support RedHat mailman:2.1-8010020211110115755.656b880e *
Red Hat Enterprise Linux 8.2 Extended Update Support RedHat mailman:2.1-8020020211110111201.c3a0935b *
Red Hat Enterprise Linux 8.4 Extended Update Support RedHat mailman:2.1-8040020211109094506.70584597 *
Mailman Ubuntu bionic *
Mailman Ubuntu esm-infra/xenial *
Mailman Ubuntu focal *
Mailman Ubuntu upstream *

Potential Mitigations

  • Common protection mechanisms include:

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

  • Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]

References