An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://gitlab.com/mailman/hyperkitty/-/issues/380 | issue tracking patch exploit third party advisory |
https://gitlab.com/mailman/hyperkitty/-/commit/9025324597d60b2dff740e49b70b15589d6804fa | third party advisory patch |
https://www.debian.org/security/2021/dsa-4922 | third party advisory vendor advisory |
https://techblog.wikimedia.org/2021/06/11/discovering-and-fixing-cve-2021-33038-in-mailman3/ | third party advisory patch |