![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.16339 |
Category: | Web application abuses |
Title: | Mailman private.py Directory Traversal Vulnerability |
Summary: | Authenticated Mailman users can view arbitrary files on the remote host.;; According to its version number, the remote installation of Mailman reportedly is prone to a directory traversal; vulnerability in 'Cgi/private.py'. |
Description: | Summary: Authenticated Mailman users can view arbitrary files on the remote host. According to its version number, the remote installation of Mailman reportedly is prone to a directory traversal vulnerability in 'Cgi/private.py'. Vulnerability Insight: The flaw comes into play only on web servers that don't strip extraneous slashes from URLs, such as Apache 1.3.x, and allows a list subscriber, using a specially crafted web request, to retrieve arbitrary files from the server - any file accessible by the user under which the web server operates, including email addresses and passwords of subscribers of any lists hosted on the server. For example, if '$user' and '$pass' identify a subscriber of the list '$listname@$target', then the following URL : http://example.com/mailman/private/$listname/.../....///mailman?username=$user&password=$pass allows access to archives for the mailing list named 'mailman' for which the user might not otherwise be entitled. Solution: Upgrade to Mailman 2.1.6b1 or apply the fix referenced in the first URL above. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-0202 http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html Bugtraq: 20050209 [USN-78-1] Mailman vulnerability (Google Search) http://marc.info/?l=bugtraq&m=110805795122386&w=2 Debian Security Information: DSA-674 (Google Search) http://www.debian.org/security/2005/dsa-674 http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031562.html http://www.gentoo.org/security/en/glsa/glsa-200502-11.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:037 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10657 http://www.redhat.com/support/errata/RHSA-2005-136.html http://www.redhat.com/support/errata/RHSA-2005-137.html http://securitytracker.com/id?1013145 http://secunia.com/advisories/14211 SuSE Security Announcement: SUSE-SA:2005:007 (Google Search) http://www.novell.com/linux/security/advisories/2005_07_mailman.html |
Copyright | Copyright (C) 2005 George A. Theall |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |