Vulnerability Details : CVE-2021-33038
Potential exploit
An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
Products affected by CVE-2021-33038
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:hyperkitty_project:hyperkitty:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-33038
0.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-33038
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2021-33038
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-33038
-
https://www.debian.org/security/2021/dsa-4922
Debian -- Security Information -- DSA-4922-1 hyperkittyThird Party Advisory
-
https://techblog.wikimedia.org/2021/06/11/discovering-and-fixing-cve-2021-33038-in-mailman3/
Discovering and fixing CVE-2021-33038 in Mailman3 – [[WM:TECHBLOG]]Patch;Third Party Advisory
-
https://gitlab.com/mailman/hyperkitty/-/issues/380
hyperkitty_import command leaves archives public until import finishes (#380) · Issues · GNU Mailman / HyperKitty · GitLabExploit;Issue Tracking;Patch;Third Party Advisory
-
https://gitlab.com/mailman/hyperkitty/-/commit/9025324597d60b2dff740e49b70b15589d6804fa
Ensure private archives stay private during import (CVE-2021-33038) (90253245) · Commits · GNU Mailman / HyperKitty · GitLabPatch;Third Party Advisory
Jump to