*** This bug is a security vulnerability ***

Private security bug reported:

The `csrf_token` generated for the `options` page is always an `admin`
token rather than specific to the authenticated user for that session.
This admin token contains information that is derived from the hashed
list admin password, which could theoretically allow a brute-force
attack to obtain the list admin password.

Thanks to Andre Protas, Richard Cloke and Andy Nuttall of Apple for
reporting these and helping with the development of a fix.

** Affects: mailman
     Importance: Medium
     Assignee: Mark Sapiro (msapiro)
         Status: In Progress

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-42096

** Summary changed:

- Potential Privilege escallation via the user options page.
+ Potential Privilege escalation via the user options page.

-- 
You received this bug notification because you are a member of Mailman
Coders, which is subscribed to GNU Mailman.
https://bugs.launchpad.net/bugs/1947639

Title:
  Potential Privilege escalation via the user options page.

To manage notifications about this bug go to:
https://bugs.launchpad.net/mailman/+bug/1947639/+subscriptions

_______________________________________________
Mailman-coders mailing list -- [email protected]
To unsubscribe send an email to [email protected]
https://mail.python.org/mailman3/lists/mailman-coders.python.org/
Member address: [email protected]

Reply via email to