Description
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3049-1 | mailman security update |
EUVD |
EUVD-2021-2613 | In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes. |
Github GHSA |
GHSA-xq58-69h2-765m | Cross Site Request Forgery in mailman |
Ubuntu USN |
USN-5180-1 | Mailman vulnerability |
Ubuntu USN |
USN-8067-1 | Mailman vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:17:24.848Z
Reserved: 2021-11-26T00:00:00.000Z
Link: CVE-2021-44227
No data.
Status : Modified
Published: 2021-12-02T03:15:06.797
Modified: 2024-11-21T06:30:37.880
Link: CVE-2021-44227
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN