CVE-2016-6893

Published: 02 September 2016

Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
mailman
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 16.04 LTS (Xenial Xerus)
Released (1:2.1.20-1ubuntu0.1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [1:2.1.16-2ubuntu0.2])
Patches:
Upstream: http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/revision/1668
Upstream: https://mail.python.org/pipermail/mailman-announce/2016-August/000226.html