First published: Wed May 06 2020(Updated: )
/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Mailman | <2.1.31 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =31 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Backports SLE | =15.0-sp2 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
debian/mailman |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12108 is a vulnerability in GNU Mailman before 2.1.31 that allows Arbitrary Content Injection.
The severity of CVE-2020-12108 is medium with a CVSS score of 6.5.
CVE-2020-12108 affects GNU Mailman before version 2.1.31, allowing Arbitrary Content Injection.
To fix CVE-2020-12108, update GNU Mailman to version 2.1.31 or later.
More information about CVE-2020-12108 can be found at the following references: [Reference 1](https://bugs.launchpad.net/mailman/+bug/1873722), [Reference 2](https://code.launchpad.net/mailman), [Reference 3](https://mail.python.org/pipermail/mailman-announce/).