Name | CVE-2008-0564 |
Description | Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.10b1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) editing templates and (2) the list's "info attribute" in the web administrator interface, a different vulnerability than CVE-2006-3636. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
mailman (PTS) | jessie, jessie (lts) | 1:2.1.18-2+deb8u8 | fixed |
| stretch (security), stretch (lts), stretch | 1:2.1.23-1+deb9u8 | fixed |
| buster | 1:2.1.29-1+deb10u5 | fixed |
| buster (security), buster (lts) | 1:2.1.29-1+deb10u2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
mailman | source | (unstable) | 1:2.1.10~b3-1 | low | | |
Notes
[etch] - mailman <no-dsa> (Minor issue)
[sarge] - mailman <no-dsa> (Minor issue)
Someone authenticated as list admin can insert malicious script
into list templates. This already consists of a high degree of
control over the mailinglist, so not a very important issue.
This enhances the fix for CVE-2006-3636.
http://mail.python.org/pipermail/mailman-announce/2008-February/000095.html