*** This bug is a security vulnerability ***

Private security bug reported:

A valid `csrf_token` generated for one user session can be considered
valid for another user session. This allows an attacker to generate a
token which they can engineer another user, with an active session, to
send to the server to execute the commands specified by the attacker
whilst authenticated as the victim. Theoretically this could allow
account take over.

Thanks to Andre Protas, Richard Cloke and Andy Nuttall of Apple for
reporting these and helping with the development of a fix.

** Affects: mailman
     Importance: Medium
     Assignee: Mark Sapiro (msapiro)
         Status: In Progress

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-42097

-- 
You received this bug notification because you are a member of Mailman
Coders, which is subscribed to GNU Mailman.
https://bugs.launchpad.net/bugs/1947640

Title:
  Potential CSRF attack via the user options page.

To manage notifications about this bug go to:
https://bugs.launchpad.net/mailman/+bug/1947640/+subscriptions

_______________________________________________
Mailman-coders mailing list -- [email protected]
To unsubscribe send an email to [email protected]
https://mail.python.org/mailman3/lists/mailman-coders.python.org/
Member address: [email protected]

Reply via email to