- ------------------------------------------------------------------------- Debian LTS Advisory DLA-3049-1 [email protected] https://www.debian.org/lts/security/ Sylvain Beucler June 09, 2022 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : mailman Version : 1:2.1.23-1+deb9u8 CVE ID : CVE-2021-43331 CVE-2021-43332 CVE-2021-44227 Debian Bug : 1000367 1001685 Several vulnerabilities were discovered in Mailman, a web-based mailing list manager. An attacker could impersonate more privileged accounts through different vectors. CVE-2021-43331 A crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS. (Closes: #1000367) CVE-2021-43332 The CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack. CVE-2021-44227 A list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes. For Debian 9 stretch, these problems have been fixed in version 1:2.1.23-1+deb9u8. We recommend that you upgrade your mailman packages. For the detailed security status of mailman please refer to its security tracker page at: https://security-tracker.debian.org/tracker/mailman Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS