Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:XSS:MAILMAN-OPTIONS

Severity

Low

Recommended

No

Category

HTTP

Keywords

Mailman "options.py" Cross-Site Scripting

Release Date

2005/01/19

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Mailman "options.py" Cross-Site Scripting


This signature detects attempts to exploit a cross-site scripting vulnerability in Mailman 2.1, a discussion list management application that uses Web pages. Attackers can include options.py in a maliciously crafted URI sent to Mailman scripts, enabling attackers to place scripts or HTML into discussion list Web pages.

Extended Description

A vulnerability has been discovered in GNU Mailman. The issue occurs to insufficient sanitization of user-supplied data which is output when generating error pages. As a result, attackers may embed malicious script code or HTML into a link to a site running the vulnerable software. If such a link is followed, the attacker-supplied code will be interpreted in the web browser of the victim of the attack. It may be possible to steal the unsuspecting user's cookie-based authentication credentials, as well as other sensitive information. Other attacks are also possible. It has been reported that GNU Mailman 2.0.11 is not affected by this issue.

Affected Products

  • GNU Mailman 2.1.0

References

  • BugTraq: 6678
  • CVE: CVE-2003-0038
  • URL: http://www.debian.org/security/2004/dsa-436

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out