CVE-2021-43332Insufficiently Protected Credentials in Mailman

Severity
6.5MEDIUMNVD
OSV6.1
EPSS
0.1%
top 68.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 12
Latest updateMay 24

Description

In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

NVDgnu/mailman< 2.1.36
Ubuntugnu/mailman< 1:2.1.26-1ubuntu0.5+2

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

5
GHSA
GHSA-w7fq-695f-9q8v: In GNU Mailman before 22022-05-24
OSV
mailman vulnerabilities2021-11-25
OSV
mailman vulnerabilities2021-11-18
OSV
CVE-2021-43332: In GNU Mailman before 22021-11-12
CVEList
CVE-2021-43332: In GNU Mailman before 22021-11-12

📋Vendor Advisories

3
Ubuntu
Mailman vulnerabilities2021-11-25
Ubuntu
Mailman vulnerabilities2021-11-18
Red Hat
mailman: a list moderator can crack the list admin password encrypted in a CSRF token2021-11-13
CVE-2021-43332 — Insufficiently Protected Credentials | cvebase