GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password.
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Link | Tags |
---|---|
https://mail.python.org/archives/list/mailman-announce%40python.org/thread/IKCO6JU755AP5G5TKMBJL6IEZQTTNPDQ/ | |
https://bugs.launchpad.net/mailman/+bug/1947639 | third party advisory patch |
http://www.openwall.com/lists/oss-security/2021/10/21/4 | mailing list third party advisory patch |
https://www.debian.org/security/2021/dsa-4991 | third party advisory vendor advisory |