Sympa before 6.2.59b.2 allows remote attackers to obtain full SOAP API access by sending any arbitrary string (except one from an expired cookie) as the cookie value to authenticateAndRun.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://github.com/sympa-community/sympa/issues/1041 | exploit third party advisory patch |
https://github.com/sympa-community/sympa/pull/1044 | third party advisory patch |
https://github.com/sympa-community/sympa/blob/6.2.59b.2/NEWS.md | third party advisory release notes |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976020 | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/12/msg00026.html | third party advisory mailing list |
https://www.debian.org/security/2020/dsa-4818 | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JICIHAJKKCZXJNIICUDYXGZFQCN6J4U6/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFZWDEKQFW3EH665OECDWIWM2MI7T53Y/ | vendor advisory |