CVE-2011-0707

Loading...

General

Score:4.3/10.0
Severity:Low
Category:XSS Injection
Exploit:Available

Impact Metrics

Confidentiality:None
Integrity:Partial
Availability:None

Exploitability Metrics

Access Vector:Network
Access Complexity:Medium
Authentication:None

Relative vulnerabilities

CVE-2008-0564, CVE-2010-3089

Published on 22/02/11 - Updated on 17/08/17

Description

Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.

Category: XSS Injection

CWE-79 (Cross-Site Scripting (XSS))
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Security Notices

US National Vulnerability DatabaseCVE-2011-0707
Agence Nationale de la Sécurité des Systèmes d'Information CERTA-2011-AVI-100, CERTA-2011-AVI-564
CentOS CESA-2011:0307
Debian DSA-2170-1
Oracle Linux ELSA-2011-0307, ELSA-2011-0308
Redhat RHSA-2011:0307, RHSA-2011:0308
Renater 2011/VULN139

Exploits

SecurityFocusBID-46464

Relative technologies

VendorProduct
gnumailman

Share this vulnerability with:

Twitter Facebook LinkedIn Mail