First published: Fri Apr 24 2020(Updated: )
GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Mailman | >=2.0<2.1.30 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
openSUSE Backports SLE | =15.0-sp2 | |
openSUSE Leap | =15.2 | |
debian/mailman |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12137 is a vulnerability in GNU Mailman 2.x before version 2.1.30 that allows for XSS attacks against list-archive visitors.
CVE-2020-12137 affects GNU Mailman 2.x versions before 2.1.30, allowing for potential XSS attacks against list-archive visitors.
The severity of CVE-2020-12137 is medium, with a severity value of 6.1.
To fix CVE-2020-12137, you should update GNU Mailman to version 2.1.30 or later.
You can find more information about CVE-2020-12137 in the links provided: [http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/head:/NEWS](http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/head:/NEWS) and [https://www.openwall.com/lists/oss-security/2020/02/24/2](https://www.openwall.com/lists/oss-security/2020/02/24/2).