CVE-2021-46900

NameCVE-2021-46900
DescriptionSympa before 6.2.62 relies on a cookie parameter for certain security objectives, but does not ensure that this parameter exists and has an unpredictable value. Specifically, the cookie parameter is both a salt for stored passwords and an XSS protection mechanism.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sympa (PTS)jessie, jessie (lts)6.1.23~dfsg-2+deb8u3vulnerable
stretch (security), stretch (lts), stretch6.2.16~dfsg-3+deb9u5vulnerable
buster (security), buster, buster (lts)6.2.40~dfsg-1+deb10u1vulnerable
bullseye6.2.60~dfsg-4vulnerable
bookworm6.2.70~dfsg-2fixed
sid, trixie6.2.72~dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sympasourcejessie(unfixed)end-of-life
sympasourcestretch(unfixed)end-of-life
sympasource(unstable)6.2.66~dfsg-1

Notes

[bullseye] - sympa <no-dsa> (Minor issue)
[buster] - sympa <no-dsa> (Minor issue)
https://www.sympa.community/security/2021-001.html
https://github.com/sympa-community/sympa/issues/1091

Search for package or bug name: Reporting problems