CVE-2021-46900

NameCVE-2021-46900
DescriptionSympa before 6.2.62 relies on a cookie parameter for certain security objectives, but does not ensure that this parameter exists and has an unpredictable value. Specifically, the cookie parameter is both a salt for stored passwords and an XSS protection mechanism.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sympa (PTS)buster, buster (security)6.2.40~dfsg-1+deb10u1vulnerable
bullseye6.2.60~dfsg-4vulnerable
sid, trixie, bookworm6.2.70~dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sympasource(unstable)6.2.66~dfsg-1

Notes

[bullseye] - sympa <no-dsa> (Minor issue)
[buster] - sympa <no-dsa> (Minor issue)
https://www.sympa.community/security/2021-001.html
https://github.com/sympa-community/sympa/issues/1091

Search for package or bug name: Reporting problems