First published: Wed Jun 24 2020(Updated: )
GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Mailman | <2.1.33 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/mailman |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15011 is a vulnerability in GNU Mailman before version 2.1.33 that allows arbitrary content injection via the Cgi/private.py private archive login page.
CVE-2020-15011 has a severity level of 4.3 (medium).
GNU Mailman versions before 2.1.33 are affected.
Upgrade to GNU Mailman version 2.1.33 or later.
For more information about CVE-2020-15011, you can visit the following references: [Link 1](https://bugs.launchpad.net/mailman/+bug/1877379), [Link 2](https://lists.debian.org/debian-lts-announce/2020/06/msg00036.html), [Link 3](https://usn.ubuntu.com/4406-1/)