In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://bugs.launchpad.net/mailman/+bug/1949401 | issue tracking third party advisory patch |
https://mail.python.org/archives/list/mailman-announce%40python.org/message/I2X7PSFXIEPLM3UMKZMGOEO3UFYETGRL/ | |
https://lists.debian.org/debian-lts-announce/2022/06/msg00011.html | third party advisory mailing list |