SB2021110117 - Ubuntu update for mailman



SB2021110117 - Ubuntu update for mailman

Published: November 1, 2021

Security Bulletin ID SB2021110117
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 80% Low 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Spoofing attack (CVE-ID: CVE-2020-12108)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data when processing email addresses. A remote attacker can create a specially crafted email and spoof content of email message.


2) Stored cross-site scripting (CVE-ID: CVE-2020-12137)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to mailman uses the .obj extension for scrubbed application/octet-stream MIME parts. A remote attacker can send a specially crafted attachment to the list, trick the victim to open the email in the list archive and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


3) Code Injection (CVE-ID: CVE-2020-15011)

The vulnerability allows a remote attacker to inject arbitrary content.

The vulnerability exists due to improper input validation within the Cgi/private.py private archive login page.  A remote attacker can send a specially crafted request and inject arbitrary content.

Successful exploitation of the vulnerability requires that the roster visibility (private_roster) setting is 'Anyone'.


4) Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (CVE-ID: CVE-2021-42096)

The vulnerability allows a remote attacker to brute-force the administrative password.

The vulnerability exists due to a certain csrf_token value is derived from the admin password. A remote attacker can conduct a brute-force attack against that password and gain unauthorized access to the application.


5) Cross-site request forgery (CVE-ID: CVE-2021-42097)

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and take over the admin account, as the csrf_token value is not specific to a single user account.


Remediation

Install update from vendor's website.