First published: Tue Feb 22 2011(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mailman | =2.1.13 | |
Mailman | =2.1.5 | |
Mailman | =2.1.11-rc1 | |
Mailman | =2.0.5 | |
Mailman | =2.0.1 | |
Mailman | =2.1.5.8 | |
Mailman | =2.1.3 | |
Mailman | =2.0.11 | |
Mailman | =2.0.6 | |
Mailman | =2.0-beta3 | |
Mailman | =2.1.8 | |
Mailman | =2.1.11-rc2 | |
Mailman | =1.1 | |
Mailman | =2.0.14 | |
Mailman | =2.0-beta5 | |
Mailman | =2.0.12 | |
Mailman | =2.1.13-rc1 | |
Mailman | =2.0 | |
Mailman | =2.1.11 | |
Mailman | =2.0-beta4 | |
Mailman | =2.1.2 | |
Mailman | =2.0.9 | |
Mailman | =2.1.9 | |
Mailman | =2.0.3 | |
Mailman | =2.1-stable | |
Mailman | =2.1.14-rc1 | |
Mailman | =2.0.13 | |
Mailman | =2.1.6 | |
Mailman | =2.1-alpha | |
Mailman | =2.0.4 | |
Mailman | =2.1 | |
Mailman | =2.1-beta | |
Mailman | =2.1b1 | |
Mailman | <=2.1.14 | |
Mailman | =2.1.10 | |
Mailman | =2.1.1 | |
Mailman | =2.1.12 | |
Mailman | =1.0 | |
Mailman | =2.0.8 | |
Mailman | =2.1.7 | |
Mailman | =2.1.4 | |
Mailman | =2.0.10 | |
Mailman | =2.1.1-beta1 | |
Mailman | =2.0.2 | |
Mailman | =2.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0707 is considered a moderate severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2011-0707, upgrade GNU Mailman to version 2.1.15 or later, which addresses the XSS vulnerabilities.
CVE-2011-0707 affects GNU Mailman versions up to and including 2.1.14.
CVE-2011-0707 can facilitate cross-site scripting (XSS) attacks, allowing attackers to inject malicious scripts into web pages.
Yes, CVE-2011-0707 can lead to data exposure as attackers can execute scripts in the context of the affected user's session.