First published: Thu Dec 02 2021(Updated: )
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Mailman | <2.1.38 | |
Debian Debian Linux | =9.0 | |
<2.1.38 | ||
=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-44227.
The severity of CVE-2021-44227 is high with a CVSS score of 8.8.
GNU Mailman versions before 2.1.38 and Debian Debian Linux version 9.0 are affected by CVE-2021-44227.
A list member or moderator can exploit the vulnerability to craft an admin request and perform unauthorized actions such as setting a new admin password or making other changes.
Upgrade to GNU Mailman version 2.1.38 or later to mitigate the vulnerability.