Vulnerabilities > CVE-2006-3636 - Unspecified vulnerability in GNU Mailman
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.9rc1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 12 |
Exploit-Db
description | Mailman 2.1.x Multiple Input Validation Vulnerabilities. CVE-2006-3636. Webapps exploit for cgi platform |
id | EDB-ID:28570 |
last seen | 2016-02-03 |
modified | 2006-09-14 |
published | 2006-09-14 |
reporter | Moritz Naumann |
source | https://www.exploit-db.com/download/28570/ |
title | Mailman 2.1.x - Multiple Input Validation Vulnerabilities |
Nessus
NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2006-0600.NASL description Updated mailman packages that fix security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mailman is a program used to help manage email discussion lists. A flaw was found in the way Mailman handled MIME multipart messages. An attacker could send a carefully crafted MIME multipart email message to a mailing list run by Mailman which caused that particular mailing list to stop working. (CVE-2006-2941) Several cross-site scripting (XSS) issues were found in Mailman. An attacker could exploit these issues to perform cross-site scripting attacks against the Mailman administrator. (CVE-2006-3636) Red Hat would like to thank Barry Warsaw for disclosing these vulnerabilities. Users of Mailman should upgrade to these updated packages, which contain backported patches to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 22320 published 2006-09-12 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/22320 title CentOS 3 / 4 : mailman (CESA-2006:0600) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2006-0600.NASL description From Red Hat Security Advisory 2006:0600 : Updated mailman packages that fix security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mailman is a program used to help manage email discussion lists. A flaw was found in the way Mailman handled MIME multipart messages. An attacker could send a carefully crafted MIME multipart email message to a mailing list run by Mailman which caused that particular mailing list to stop working. (CVE-2006-2941) Several cross-site scripting (XSS) issues were found in Mailman. An attacker could exploit these issues to perform cross-site scripting attacks against the Mailman administrator. (CVE-2006-3636) Red Hat would like to thank Barry Warsaw for disclosing these vulnerabilities. Users of Mailman should upgrade to these updated packages, which contain backported patches to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 67397 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67397 title Oracle Linux 3 / 4 : mailman (ELSA-2006-0600) NASL family SuSE Local Security Checks NASL id SUSE9_11243.NASL description This update of mailman fixes the following security issues : - A malicious user could visit a specially crafted URI and inject an apparent log message into Mailman last seen 2020-06-01 modified 2020-06-02 plugin id 41102 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41102 title SuSE9 Security Update : mailman (YOU Patch Number 11243) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_FFFA92573C1711DB86AB00123FFE8333.NASL description Secunia reports : Mailman can be exploited by malicious people to conduct cross-site scripting and phishing attacks, and cause a DoS (Denial of Service). 1) An error in the logging functionality can be exploited to inject a spoofed log message into the error log via a specially crafted URL. Successful exploitation may trick an administrator into visiting a malicious website. 2) An error in the processing of malformed headers which does not follow the RFC 2231 standard can be exploited to cause a DoS (Denial of Service). 3) Some unspecified input isn last seen 2020-06-01 modified 2020-06-02 plugin id 22304 published 2006-09-05 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/22304 title FreeBSD : mailman -- Multiple Vulnerabilities (fffa9257-3c17-11db-86ab-00123ffe8333) NASL family SuSE Local Security Checks NASL id SUSE_MAILMAN-2170.NASL description This update of mailman fixes the following security issues : - A malicious user could visit a specially crafted URI and inject an apparent log message into Mailman last seen 2020-06-01 modified 2020-06-02 plugin id 27344 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27344 title openSUSE 10 Security Update : mailman (mailman-2170) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1188.NASL description Several security related problems have been discovered in mailman, the web-based GNU mailing list manager. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2006-3636 Moritz Naumann discovered several cross-site scripting problems that could allow remote attackers to inject arbitrary web script code or HTML. - CVE-2006-4624 Moritz Naumann discovered that a remote attacker can inject arbitrary strings into the logfile. last seen 2020-06-01 modified 2020-06-02 plugin id 22730 published 2006-10-14 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/22730 title Debian DSA-1188-1 : mailman - format string NASL family SuSE Local Security Checks NASL id SUSE_MAILMAN-2174.NASL description This update of mailman fixes the following security issues : - A malicious user could visit a specially crafted URI and inject an apparent log message into Mailman last seen 2020-06-01 modified 2020-06-02 plugin id 29519 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29519 title SuSE 10 Security Update : mailman (ZYPP Patch Number 2174) NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2006-165.NASL description A flaw was discovered in how Mailman handles MIME multipart messages where an attacker could send a carefully-crafted MIME multipart message to a Mailman-run mailing list causing that mailing list to stop working (CVE-2006-2941). As well, a number of XSS (cross-site scripting) issues were discovered that could be exploited to perform XSS attacks against the Mailman administrator (CVE-2006-3636). Finally, a CRLF injection vulnerability allows remote attackers to spoof messages in the error log (CVE-2006-4624). Updated packages have been patched to address these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 23909 published 2006-12-16 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/23909 title Mandrake Linux Security Advisory : mailman (MDKSA-2006:165) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200609-12.NASL description The remote host is affected by the vulnerability described in GLSA-200609-12 (Mailman: Multiple vulnerabilities) Mailman fails to properly handle standards-breaking RFC 2231 formatted headers. Furthermore, Moritz Naumann discovered several XSS vulnerabilities and a log file injection. Impact : An attacker could exploit these vulnerabilities to cause Mailman to stop processing mails, to inject content into the log file or to execute arbitrary scripts running in the context of the administrator or mailing list user last seen 2020-06-01 modified 2020-06-02 plugin id 22429 published 2006-09-22 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/22429 title GLSA-200609-12 : Mailman: Multiple vulnerabilities NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-345-1.NASL description Steve Alexander discovered that mailman did not properly handle attachments with special filenames. A remote user could exploit that to stop mail delivery until the server administrator manually cleaned these posts. (CVE-2006-2941) Various cross-site scripting vulnerabilities have been reported by Barry Warsaw. By using specially crafted email addresses, names, and similar arbitrary user-defined strings, a remote attacker could exploit this to run web script code in the list administrator last seen 2020-06-01 modified 2020-06-02 plugin id 27924 published 2007-11-10 reporter Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/27924 title Ubuntu 5.04 / 5.10 / 6.06 LTS : mailman vulnerabilities (USN-345-1) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2006-0600.NASL description Updated mailman packages that fix security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mailman is a program used to help manage email discussion lists. A flaw was found in the way Mailman handled MIME multipart messages. An attacker could send a carefully crafted MIME multipart email message to a mailing list run by Mailman which caused that particular mailing list to stop working. (CVE-2006-2941) Several cross-site scripting (XSS) issues were found in Mailman. An attacker could exploit these issues to perform cross-site scripting attacks against the Mailman administrator. (CVE-2006-3636) Red Hat would like to thank Barry Warsaw for disclosing these vulnerabilities. Users of Mailman should upgrade to these updated packages, which contain backported patches to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 22330 published 2006-09-12 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/22330 title RHEL 3 / 4 : mailman (RHSA-2006:0600)
Oval
accepted | 2013-04-29T04:06:39.552-04:00 | ||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||
contributors |
| ||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||
description | Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.9rc1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||||||||||||||||||||
family | unix | ||||||||||||||||||||
id | oval:org.mitre.oval:def:10553 | ||||||||||||||||||||
status | accepted | ||||||||||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||||||||||
title | Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.9rc1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||||||||||||||||||||
version | 26 |
Packetstorm
data source | https://packetstormsecurity.com/files/download/50027/0013.txt |
id | PACKETSTORM:50027 |
last seen | 2016-12-05 |
published | 2006-09-14 |
reporter | Moritz Naumann |
source | https://packetstormsecurity.com/files/50027/0013.txt.html |
title | 0013.txt |
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html
- http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html
- http://moritz-naumann.com/adv/0013/mailmanmulti/0013.txt
- http://moritz-naumann.com/adv/0013/mailmanmulti/0013.txt
- http://rhn.redhat.com/errata/RHSA-2006-0600.html
- http://rhn.redhat.com/errata/RHSA-2006-0600.html
- http://secunia.com/advisories/21732
- http://secunia.com/advisories/21732
- http://secunia.com/advisories/21792
- http://secunia.com/advisories/21792
- http://secunia.com/advisories/21879
- http://secunia.com/advisories/21879
- http://secunia.com/advisories/22011
- http://secunia.com/advisories/22011
- http://secunia.com/advisories/22020
- http://secunia.com/advisories/22020
- http://secunia.com/advisories/22227
- http://secunia.com/advisories/22227
- http://secunia.com/advisories/22639
- http://secunia.com/advisories/22639
- http://security.gentoo.org/glsa/glsa-200609-12.xml
- http://security.gentoo.org/glsa/glsa-200609-12.xml
- http://securitytracker.com/id?1016808
- http://securitytracker.com/id?1016808
- http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295
- http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295
- http://www.debian.org/security/2006/dsa-1188
- http://www.debian.org/security/2006/dsa-1188
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:165
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:165
- http://www.novell.com/linux/security/advisories/2006_25_sr.html
- http://www.novell.com/linux/security/advisories/2006_25_sr.html
- http://www.securityfocus.com/archive/1/445992/100/0/threaded
- http://www.securityfocus.com/archive/1/445992/100/0/threaded
- http://www.securityfocus.com/bid/19831
- http://www.securityfocus.com/bid/19831
- http://www.securityfocus.com/bid/20021
- http://www.securityfocus.com/bid/20021
- http://www.ubuntu.com/usn/usn-345-1
- http://www.ubuntu.com/usn/usn-345-1
- http://www.vupen.com/english/advisories/2006/3446
- http://www.vupen.com/english/advisories/2006/3446
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28731
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28731
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10553
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10553