Vulnerability Details : CVE-2016-6893
Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2016-6893
- cpe:2.3:a:gnu:mailman:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.13:rc1:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.11:rc1:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.11:rc2:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.14:rc1:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.10b3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.10b4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.10:rc1:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.16:rc1:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.16:rc2:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.18:rc3:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.19:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.19:rc1:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.23:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.10b1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.12:rc1:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.12:rc2:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.15:rc1:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.18:rc1:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.18:rc2:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.21:rc2:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.22:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.18-1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.20:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.21:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.14-1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.16:rc3:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.17:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.19:rc2:*:*:*:*:*:*
- cpe:2.3:a:gnu:mailman:2.1.19:rc3:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-6893
0.21%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 44 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-6893
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2016-6893
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-6893
-
http://www.debian.org/security/2016/dsa-3668
Debian -- Security Information -- DSA-3668-1 mailman
-
http://www.securityfocus.com/bid/92731
GNU Mailman CVE-2016-6893 Cross Site Request Forgery Vulnerability
-
http://www.securitytracker.com/id/1036728
Mailman Access Control Flaw in User Options Page Lets Remote Users Conduct Cross-Site Request Forgery Attacks - SecurityTracker
-
https://bugs.launchpad.net/bugs/1614841
Bug #1614841 “CSRF protection needs to be extended to the user o...” : Bugs : GNU MailmanIssue Tracking
Jump to