First published: Sat Nov 28 2020(Updated: )
Sympa before 6.2.59b.2 allows remote attackers to obtain full SOAP API access by sending any arbitrary string (except one from an expired cookie) as the cookie value to authenticateAndRun.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/sympa | <=6.2.40~dfsg-7<=6.2.40~dfsg-1 | 6.2.58~dfsg-2 6.2.40~dfsg-1+deb10u1 |
debian/6.2.16~dfsg-3+deb9u4 | ||
debian/sympa | 6.2.60~dfsg-4 6.2.70~dfsg-2 6.2.72~dfsg-1 | |
Sympa Sympa | <=6.2.58 | |
Sympa Sympa | =6.2.59-beta1 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29668 is rated as a high severity vulnerability due to its impact on the SOAP API authentication process.
To fix CVE-2020-29668, upgrade to Sympa versions 6.2.60~dfsg-4 or 6.2.70~dfsg-2 or later.
CVE-2020-29668 affects Sympa versions up to and including 6.2.58.
Yes, CVE-2020-29668 allows remote attackers to gain unauthorized SOAP API access.
Any arbitrary string can be used as a cookie value to exploit CVE-2020-29668, except for those from expired cookies.