{"id":"CVE-2021-46900","details":"Sympa before 6.2.62 relies on a cookie parameter for certain security objectives, but does not ensure that this parameter exists and has an unpredictable value. Specifically, the cookie parameter is both a salt for stored passwords and an XSS protection mechanism.","modified":"2026-04-02T06:53:12.226660Z","published":"2023-12-31T05:15:08.040Z","references":[{"type":"ADVISORY","url":"https://www.sympa.community/security/2021-001.html"},{"type":"ADVISORY","url":"https://github.com/sympa-community/sympa-community.github.io/blob/master/security/2021-001.md"},{"type":"REPORT","url":"https://github.com/sympa-community/sympa/issues/1091"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sympa-community/sympa","events":[{"introduced":"0"},{"fixed":"39e3006ad6c948dba9e8322f9d5a5823ff2d727b"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.2.62"}]}}],"versions":["6.2.16","6.2.17b.1","6.2.17b.2","6.2.18","6.2.19b.1","6.2.19b.2","6.2.20","6.2.22","6.2.23b.1","6.2.23b.2","6.2.23b.3","6.2.24","6.2.25b.1","6.2.25b.2","6.2.25b.3","6.2.26","6.2.28","6.2.30","6.2.32","6.2.33b.1","6.2.33b.2","6.2.34","6.2.35b.1","6.2.36","6.2.37b.1","6.2.37b.2","6.2.37b.3","6.2.38","6.2.40","6.2.41b.1","6.2.41b.2","6.2.42","6.2.43b.1","6.2.43b.2","6.2.44","6.2.45b.1","6.2.45b.2","6.2.45b.3","6.2.46","6.2.48","6.2.49b.1","6.2.49b.2","6.2.49b.3","6.2.50","6.2.52","6.2.54","6.2.56","6.2.57b.1","6.2.57b.2","6.2.58","6.2.59b.1","6.2.59b.2","6.2.60","6.2.61b.1","6.2.61b.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-46900.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}