First published: Fri Oct 22 2021(Updated: )
Andre Protas, Richard Cloke, and Andy Nuttall discovered that Mailman did not properly associate cross-site request forgery (CSRF) tokens to specific accounts. A remote attacker could use this to perform a CSRF attack to gain access to another account. (CVE-2021-42097) Andre Protas, Richard Cloke, and Andy Nuttall discovered that Mailman's cross-site request forgery (CSRF) tokens for the options page are derived from the admin password. A remote attacker could possibly use this to assist in performing a brute force attack against the admin password. (CVE-2021-42096)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/mailman | <1:2.1.26-1ubuntu0.4 | 1:2.1.26-1ubuntu0.4 |
=18.04 | ||
All of | ||
ubuntu/mailman | <1:2.1.20-1ubuntu0.6+esm1 | 1:2.1.20-1ubuntu0.6+esm1 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-42097 is high.
An attacker can exploit CVE-2021-42097 by using cross-site request forgery (CSRF) to gain access to another account.
Mailman versions 1:2.1.26-1ubuntu0.4 and 1:2.1.20-1ubuntu0.6+esm1 are affected by CVE-2021-42097.
To fix CVE-2021-42097, update Mailman to version 1:2.1.26-1ubuntu0.4 or version 1:2.1.20-1ubuntu0.6+esm1 depending on your Ubuntu version.
More information about CVE-2021-42097 can be found at the following links: [CVE-2021-42097](https://ubuntu.com/security/CVE-2021-42097) and [USN-5121-2](https://ubuntu.com/security/notices/USN-5121-2).