{"id":"USN-5121-1","summary":"mailman vulnerabilities","details":"Andre Protas, Richard Cloke, and Andy Nuttall discovered that Mailman\ndid not properly associate cross-site request forgery (CSRF) tokens\nto specific accounts. A remote attacker could use this to perform a\nCSRF attack to gain access to another account. (CVE-2021-42097)\n\nAndre Protas, Richard Cloke, and Andy Nuttall discovered that Mailman's\ncross-site request forgery (CSRF) tokens for the options page are\nderived from the admin password. A remote attacker could possibly use\nthis to assist in performing a brute force attack against the admin\npassword. (CVE-2021-42096)\n","modified":"2026-02-10T04:42:21Z","published":"2021-10-22T05:47:18Z","related":["UBUNTU-CVE-2021-42096","UBUNTU-CVE-2021-42097"],"upstream":["CVE-2021-42096","CVE-2021-42097","UBUNTU-CVE-2021-42096","UBUNTU-CVE-2021-42097"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5121-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-42096"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-42097"}],"affected":[{"package":{"name":"mailman","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/mailman@1:2.1.20-1ubuntu0.6+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.1.20-1ubuntu0.6+esm1"}]}],"versions":["1:2.1.20-1","1:2.1.20-1ubuntu0.1","1:2.1.20-1ubuntu0.3","1:2.1.20-1ubuntu0.4","1:2.1.20-1ubuntu0.5","1:2.1.20-1ubuntu0.6"],"ecosystem_specific":{"binaries":[{"binary_version":"1:2.1.20-1ubuntu0.6+esm1","binary_name":"mailman"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5121-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"id":"CVE-2021-42096","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2021-42097","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}},{"package":{"name":"mailman","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/mailman@1:2.1.26-1ubuntu0.4?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.1.26-1ubuntu0.4"}]}],"versions":["1:2.1.23-1","1:2.1.24-1","1:2.1.25-1","1:2.1.26-1","1:2.1.26-1ubuntu0.1","1:2.1.26-1ubuntu0.2","1:2.1.26-1ubuntu0.3"],"ecosystem_specific":{"binaries":[{"binary_version":"1:2.1.26-1ubuntu0.4","binary_name":"mailman"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5121-1.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"id":"CVE-2021-42096","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2021-42097","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}