GNU Mailman Create Script未明跨站脚本漏洞

漏洞信息详情

GNU Mailman Create Script未明跨站脚本漏洞

漏洞简介

Mailman 2.1.3之前版本中的CGI脚本创建存在跨站脚本(XSS)漏洞。远程攻击者可以借助该漏洞窃取其他用户的cookies。

漏洞公告

Mailman version 2.1.3 is available to address this issue.
Conectiva has released an advisory (CLA-2004:842) to address this and other issues. Please see the referenced advisory for more information.
GNU Mailman 1.0

GNU Mailman 1.1

GNU Mailman 2.0 beta3

GNU Mailman 2.0 .3

GNU Mailman 2.0 .7

GNU Mailman 2.0 beta4

GNU Mailman 2.0 .2

GNU Mailman 2.0 beta5

GNU Mailman 2.0 .5

GNU Mailman 2.0

GNU Mailman 2.0 .1

GNU Mailman 2.0 .8

GNU Mailman 2.0 .6

GNU Mailman 2.0.1

GNU Mailman 2.0.10

GNU Mailman 2.0.11

GNU Mailman 2.0.12

GNU Mailman 2.0.13

GNU Mailman 2.0.2

GNU Mailman 2.0.3

GNU Mailman 2.0.4

GNU Mailman 2.0.4

GNU Mailman 2.0.5

GNU Mailman 2.0.6

GNU Mailman 2.0.7

GNU Mailman 2.0.8

GNU Mailman 2.0.9

GNU Mailman 2.1

参考网址

来源: REDHAT
名称: RHSA-2004:020
链接:http://www.redhat.com/support/errata/RHSA-2004-020.html

来源: mail.python.org
链接:http://mail.python.org/pipermail/mailman-announce/2003-September/000061.html

来源: MANDRAKE
名称: MDKSA-2004:013
链接:http://www.mandriva.com/security/advisories?name=MDKSA-2004:013

来源: CONECTIVA
名称: CLA-2004:842
链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000842

来源: US Government Resource: oval:org.mitre.oval:def:815
名称: oval:org.mitre.oval:def:815
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:815

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享