CVE-2016-6893
Published: 02 September 2016
Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.
Priority
CVSS 3 base score: 8.8
Status
Package | Release | Status |
---|---|---|
mailman Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1:2.1.20-1ubuntu0.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was released [1:2.1.16-2ubuntu0.2])
|
|
Patches: Upstream: http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/revision/1668 Upstream: https://mail.python.org/pipermail/mailman-announce/2016-August/000226.html |