Vulnerabilities > CVE-2006-1712 - Unspecified vulnerability in GNU Mailman 2.1.7
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN gnu
nessus
Summary
Cross-site scripting (XSS) vulnerability in the private archive script (private.py) in GNU Mailman 2.1.7 allows remote attackers to inject arbitrary web script or HTML via the action argument.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | FreeBSD Local Security Checks |
NASL id | FREEBSD_PKG_8BE2E304CCE611DAA3B100123FFE8333.NASL |
description | Secunia reports : A vulnerability has been reported in Mailman, which can be exploited by malicious people to conduct cross-site scripting attacks. Unspecified input passed to the private archive script is not properly sanitised before being returned to users. This can be exploited to execute arbitrary HTML and script code in a user |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21469 |
published | 2006-05-13 |
reporter | This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/21469 |
title | FreeBSD : mailman -- Private Archive Script XSS (8be2e304-cce6-11da-a3b1-00123ffe8333) |
References
- http://bugs.gentoo.org/show_bug.cgi?id=129136
- http://bugs.gentoo.org/show_bug.cgi?id=129136
- http://mail.python.org/pipermail/mailman-announce/2006-April/000084.html
- http://mail.python.org/pipermail/mailman-announce/2006-April/000084.html
- http://secunia.com/advisories/19558
- http://secunia.com/advisories/19558
- http://securitytracker.com/id?1015876
- http://securitytracker.com/id?1015876
- http://www.mail-archive.com/mailman-checkins%40python.org/msg06273.html
- http://www.mail-archive.com/mailman-checkins%40python.org/msg06273.html
- http://www.osvdb.org/24442
- http://www.osvdb.org/24442
- http://www.securityfocus.com/bid/17403
- http://www.securityfocus.com/bid/17403
- http://www.vupen.com/english/advisories/2006/1269
- http://www.vupen.com/english/advisories/2006/1269