Joined: 17 Apr 2002
Location: Baltimore, MD
|Posted: Thu Feb 10, 2005 5:30 pm Post subject: [ GLSA 200502-11 ] Mailman: Directory traversal vulnerabilit
|Gentoo Linux Security Advisory
Title: Mailman: Directory traversal vulnerability (GLSA 200502-11)
Date: February 10, 2005
Mailman fails to properly sanitize input, leading to information disclosure.
Mailman is a Python-based mailing list server with an extensive web interface.
Vulnerable: < 2.1.5-r4
Unaffected: >= 2.1.5-r4
Architectures: All supported architectures
Mailman contains an error in private.py which fails to properly sanitize input paths.
An attacker could exploit this flaw to obtain arbitrary files on the web server.
There is no known workaround at this time.
All Mailman users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/mailman-2.1.5-r4"
Full Disclosure Announcement
Last edited by GLSA on Sat Aug 23, 2008 4:17 am; edited 5 times in total