Arbitrary Content Injection in GNU Mailman by the GNU Project
CVE-2020-15011
4.3MEDIUM
Summary
A vulnerability in GNU Mailman versions before 2.1.33 allows attackers to inject arbitrary content through the private archive login page, potentially compromising the integrity of the mailing list. This weakness can be exploited, leading to unauthorized access and manipulation of sensitive data, highlighting the need for users to update their systems to mitigate the risks associated with this flaw.
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved