CVE Vulnerabilities

CVE-2021-43332

Insufficiently Protected Credentials

Published: Nov 12, 2021 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:P/I:N/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack.

Weakness

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

Affected Software

NameVendorStart VersionEnd Version
MailmanGnu*2.1.36 (excluding)
MailmanUbuntubionic*
MailmanUbuntuesm-apps/focal*
MailmanUbuntuesm-infra/bionic*
MailmanUbuntuesm-infra/xenial*
MailmanUbuntufocal*
MailmanUbuntutrusty*
MailmanUbuntuxenial*

Potential Mitigations

References