On Tue, Apr 29, 2025 at 9:32 AM Ralf Hildebrandt via Mailman-Users < mailman-users@python.org> wrote:
> Just received word about those three: > > https://github.com/0NYX-MY7H/CVE-2025-43921 > -- wasn't able to reproduce on 2.1.39 > Same for me. All this "exploit" gets me is the list creation page, which still requires an admin password to execute the creation of the list. > > https://github.com/0NYX-MY7H/CVE-2025-43920 > -- wasn't able to reproduce on 2.1.39, due to not using an > *_EXTERNAL_ARCHIVER > Also can't test this one, same reason. > > https://github.com/0NYX-MY7H/CVE-2025-43919 > -- wasn't able to reproduce on 2.1.39, getting "Access denied" from Mailman > > I get back the standard private archives authentication page. It seems like these exploits were only tested on the cPanel fork of mailman 2.x, but the CVEs are ambiguous on that point. I'd be interested in hearing back from the maintainers what they think. We were already planning a 3.x migration, and can move faster if we have to, but if this doesn't affect us we can just proceed on our planned schedule. <m...@conundrum.com> ------------------------------------------------------ Mailman-Users mailing list -- mailman-users@python.org To unsubscribe send an email to mailman-users-le...@python.org https://mail.python.org/mailman3/lists/mailman-users.python.org/ Mailman FAQ: http://wiki.list.org/x/AgA3 Security Policy: http://wiki.list.org/x/QIA9 Searchable Archives: https://www.mail-archive.com/mailman-users@python.org/ https://mail.python.org/archives/list/mailman-users@python.org/ Member address: arch...@mail-archive.com