CVE-2021-44227

NameCVE-2021-44227
DescriptionIn GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mailman (PTS)stretch1:2.1.23-1+deb9u5vulnerable
stretch (security)1:2.1.23-1+deb9u7vulnerable
buster1:2.1.29-1+deb10u1vulnerable
buster (security)1:2.1.29-1+deb10u2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mailmansource(unstable)(unfixed)

Notes

[buster] - mailman <no-dsa> (Minor issue)
[stretch] - mailman <no-dsa> (Minor issue; can be fixed with the next DLA)
https://bugs.launchpad.net/mailman/+bug/1952384
Patch: https://launchpadlibrarian.net/570827498/patch.txt
Regression: https://bugs.launchpad.net/mailman/+bug/1954694
Regression fixed by: https://launchpadlibrarian.net/573872803/patch.txt

Search for package or bug name: Reporting problems