CVE-2006-4624
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
07/09/2006
Last modified:
03/04/2025
Description
CRLF injection vulnerability in Utils.py in Mailman before 2.1.9rc1 allows remote attackers to spoof messages in the error log and possibly trick the administrator into visiting malicious URLs via CRLF sequences in the URI.
Impact
Base Score 2.0
2.60
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:* | 2.1.8 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html
- http://moritz-naumann.com/adv/0013/mailmanmulti/0013.txt
- http://secunia.com/advisories/21732
- http://secunia.com/advisories/22011
- http://secunia.com/advisories/22020
- http://secunia.com/advisories/22227
- http://secunia.com/advisories/22639
- http://secunia.com/advisories/27669
- http://security.gentoo.org/glsa/glsa-200609-12.xml
- http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295
- http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923
- http://www.debian.org/security/2006/dsa-1188
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A165
- http://www.novell.com/linux/security/advisories/2006_25_sr.html
- http://www.redhat.com/support/errata/RHSA-2007-0779.html
- http://www.securityfocus.com/archive/1/445992/100/0/threaded
- http://www.securityfocus.com/bid/19831
- http://www.securityfocus.com/bid/20021
- http://www.vupen.com/english/advisories/2006/3446
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28734
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9756
- http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html
- http://moritz-naumann.com/adv/0013/mailmanmulti/0013.txt
- http://secunia.com/advisories/21732
- http://secunia.com/advisories/22011
- http://secunia.com/advisories/22020
- http://secunia.com/advisories/22227
- http://secunia.com/advisories/22639
- http://secunia.com/advisories/27669
- http://security.gentoo.org/glsa/glsa-200609-12.xml
- http://sourceforge.net/project/shownotes.php?group_id=103&release_id=444295
- http://svn.sourceforge.net/viewvc/mailman/trunk/mailman/Mailman/Utils.py?r1=7859&r2=7923
- http://www.debian.org/security/2006/dsa-1188
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A165
- http://www.novell.com/linux/security/advisories/2006_25_sr.html
- http://www.redhat.com/support/errata/RHSA-2007-0779.html
- http://www.securityfocus.com/archive/1/445992/100/0/threaded
- http://www.securityfocus.com/bid/19831
- http://www.securityfocus.com/bid/20021
- http://www.vupen.com/english/advisories/2006/3446
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28734
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9756



