logo

CVE-2021-34337 mailman

Package

Manager: pip
Name: mailman
Vulnerable Version: >=0 <3.3.5

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00511 pctl0.65429

Details

Mailman Core vulnerable to timing attacks An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.

Metadata

Created: 2023-04-15T21:30:16Z
Modified: 2024-09-30T16:52:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-2jg5-xgvv-4wq7/GHSA-2jg5-xgvv-4wq7.json
CWE IDs: ["CWE-208"]
Alternative ID: GHSA-2jg5-xgvv-4wq7
Finding: F063
Auto approve: 1