Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:XSS:MAILMAN-ADMIN

Severity

Low

Recommended

No

Category

HTTP

Keywords

Mailman Admin Interface Cross-Site Scripting

Release Date

2005/01/19

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Mailman Admin Interface Cross-Site Scripting


This signature detects attempts to exploit a cross-site scripting vulnerability in the Mailman administrative Web interface.

Extended Description

Multiple cross-site scripting vulnerabilities were reported to exist in the administrative pages for GNU Mailman. These issues would likely be exploitable by enticing an administrative user to follow a malicious link with hostile HTML and script code embedded in it. Exploitation would likely result in theft of administrative cookie-based authentication credentials. Other attacks would also be possible.

Affected Products

  • GNU Mailman 2.0.0
  • GNU Mailman 2.0.0 .1
  • GNU Mailman 2.0.0 .2
  • GNU Mailman 2.0.0 .3
  • GNU Mailman 2.0.0 .5
  • GNU Mailman 2.0.0 .6
  • GNU Mailman 2.0.0 .7
  • GNU Mailman 2.0.0 .8
  • GNU Mailman 2.0.1
  • GNU Mailman 2.0.10
  • GNU Mailman 2.0.11
  • GNU Mailman 2.0.12
  • GNU Mailman 2.0.13
  • GNU Mailman 2.0.2
  • GNU Mailman 2.0.3
  • GNU Mailman 2.0.4
  • GNU Mailman 2.0.5
  • GNU Mailman 2.0.6
  • GNU Mailman 2.0.7
  • GNU Mailman 2.0.8
  • GNU Mailman 2.0.9
  • GNU Mailman 2.1.0
  • GNU Mailman 2.1.1
  • GNU Mailman 2.1.10 B1
  • GNU Mailman 2.1.3
  • Red Hat Fedora Core1

References

  • BugTraq: 9336
  • CVE: CVE-2003-0965
  • URL: http://www.mandriva.com/security/advisories/?name=MDKSA-2004:013
  • URL: http://www.debian.org/security/2004/dsa-436

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out