First published: Sat Apr 15 2023(Updated: )
An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Mailman | <3.3.5 | |
pip/mailman | <3.3.5 | 3.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34337 is a vulnerability in Mailman Core before version 3.3.5 that allows an attacker with access to the REST API to use timing attacks to determine the value of the REST API password and make arbitrary calls.
CVE-2021-34337 has a severity rating of medium (6.3).
To fix CVE-2021-34337, it is recommended to upgrade to Mailman Core version 3.3.5 or higher.
More information about CVE-2021-34337 can be found in the following references: - [GitHub Commit](https://gitlab.com/mailman/mailman/-/commit/e4a39488c4510fcad8851217f10e7337a196bb51) - [GitHub Issue](https://gitlab.com/mailman/mailman/-/issues/911) - [GitHub Tags](https://gitlab.com/mailman/mailman/-/tags)