First published: Wed Sep 08 2010(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in GNU Mailman before 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving (1) the list information field or (2) the list description field.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mailman | <3:2.1.5.1-34.rhel4.7 | 3:2.1.5.1-34.rhel4.7 |
redhat/mailman | <3:2.1.9-6.el5_6.1 | 3:2.1.9-6.el5_6.1 |
redhat/mailman | <3:2.1.12-14.el6_0.2 | 3:2.1.12-14.el6_0.2 |
Mailman | <=2.1.13 | |
Mailman | =2.1 | |
Mailman | =2.1-alpha | |
Mailman | =2.1-beta | |
Mailman | =2.1-stable | |
Mailman | =2.1.1 | |
Mailman | =2.1.2 | |
Mailman | =2.1.3 | |
Mailman | =2.1.4 | |
Mailman | =2.1.5 | |
Mailman | =2.1.6 | |
Mailman | =2.1.7 | |
Mailman | =2.1.8 | |
Mailman | =2.1.9 | |
Mailman | =2.1.10 | |
Mailman | =2.1.11 | |
Mailman | =2.1.11-rc1 | |
Mailman | =2.1.11-rc2 | |
Mailman | =2.1.12 | |
Mailman | =2.1.13-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3089 allows remote authenticated users to perform cross-site scripting (XSS) attacks by injecting web scripts or HTML.
CVE-2010-3089 affects all versions of GNU Mailman prior to 2.1.14rc1.
To fix CVE-2010-3089, update GNU Mailman to version 2.1.14rc1 or later.
Exploiting CVE-2010-3089 can lead to the execution of malicious scripts in the context of a user's session, compromising user data.
There are no effective mitigations for CVE-2010-3089 other than upgrading to a fixed version.