[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-4624Date: (C)2006-09-07   (M)2023-12-22


CRLF injection vulnerability in Utils.py in Mailman before 2.1.9rc1 allows remote attackers to spoof messages in the error log and possibly trick the administrator into visiting malicious URLs via CRLF sequences in the URI.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 2.6
Exploit Score: 4.9
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
BID-19831
BID-20021
http://www.securityfocus.com/archive/1/archive/1/445992/100/0/threaded
SECUNIA-21732
SECUNIA-22011
SECUNIA-22020
SECUNIA-22227
SECUNIA-22639
SECUNIA-27669
ADV-2006-3446
DSA-1188
GLSA-200609-12
MDKSA-2006:165
RHSA-2007:0779
SUSE-SR:2006:025
http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html
http://moritz-naumann.com/adv/0013/mailmanmulti/0013.txt
http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295
http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923
mailman-admin-spoofing(28734)

CPE    1
cpe:/a:gnu:mailman:2.1.8
CWE    1
CWE-94

© SecPod Technologies