In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mailman | Gnu | * | 2.1.36 (excluding) |
Mailman | Ubuntu | bionic | * |
Mailman | Ubuntu | esm-apps/focal | * |
Mailman | Ubuntu | esm-infra/xenial | * |
Mailman | Ubuntu | trusty | * |
Mailman | Ubuntu | xenial | * |