First published: Mon Nov 01 2021(Updated: )
USN-5009-1 fixed vulnerabilities in Mailman. This update provides the corresponding updates for Ubuntu 20.04 LTS. In addition, the following CVEs were fixed: It was discovered that Mailman allows arbitrary content injection. An attacker could use this to inject malicious content. (CVE-2020-12108, CVE-2020-15011) It was discovered that Mailman improperly sanitize the MIME content. An attacker could obtain sensitive information by sending a special type of attachment. (CVE-2020-12137) Original advisory details: Andre Protas, Richard Cloke, and Andy Nuttall discovered that Mailman did not properly associate cross-site request forgery (CSRF) tokens to specific accounts. A remote attacker could use this to perform a CSRF attack to gain access to another account. (CVE-2021-42097) Andre Protas, Richard Cloke, and Andy Nuttall discovered that Mailman’s cross-site request forgery (CSRF) tokens for the options page are derived from the admin password. A remote attacker could possibly use this to assist in performing a brute force attack against the admin password. (CVE-2021-42096)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/mailman | <1:2.1.29-1ubuntu3.1 | 1:2.1.29-1ubuntu3.1 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-5121-2 fixed the following vulnerabilities: CVE-2020-12108, CVE-2020-12137, and CVE-2021-42096.
The severity of CVE-2020-12108 is not specified.
An attacker can exploit CVE-2020-12108 by injecting arbitrary content into Mailman.
To fix the Mailman vulnerability, update to version 1:2.1.29-1ubuntu3.1 of Mailman.
More information about these vulnerabilities can be found at the following references: CVE-2020-12108 - https://ubuntu.com/security/CVE-2020-12108, CVE-2020-12137 - https://ubuntu.com/security/CVE-2020-12137, CVE-2021-42096 - https://ubuntu.com/security/CVE-2021-42096.