Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Mailman | <= 2.1.14 |
Related Weaknesses (CWE)
References
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056363.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056387.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056399.html
- http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
- http://lists.opensuse.org/opensuse-updates/2011-05/msg00000.html
- http://mail.python.org/pipermail/mailman-announce/2011-February/000157.html
- http://mail.python.org/pipermail/mailman-announce/2011-February/000158.htmlPatch
- http://osvdb.org/70936
- http://secunia.com/advisories/43294Vendor Advisory
- http://secunia.com/advisories/43389Vendor Advisory
- http://secunia.com/advisories/43425Vendor Advisory
- http://secunia.com/advisories/43549
- http://secunia.com/advisories/43580
- http://secunia.com/advisories/43829
FAQ
What is CVE-2011-0707?
CVE-2011-0707 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) usern...
How severe is CVE-2011-0707?
CVE-2011-0707 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0707?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Mailman.