Show filters
14 Total Results
Displaying 1-10 of 14
Sort by:
Attacker Value
Unknown

CVE-2021-46900

Disclosure Date: December 31, 2023 (last updated January 11, 2024)
Sympa before 6.2.62 relies on a cookie parameter for certain security objectives, but does not ensure that this parameter exists and has an unpredictable value. Specifically, the cookie parameter is both a salt for stored passwords and an XSS protection mechanism.
Attacker Value
Unknown

CVE-2020-29668

Disclosure Date: December 10, 2020 (last updated February 22, 2025)
Sympa before 6.2.59b.2 allows remote attackers to obtain full SOAP API access by sending any arbitrary string (except one from an expired cookie) as the cookie value to authenticateAndRun.
Attacker Value
Unknown

CVE-2020-26932

Disclosure Date: October 10, 2020 (last updated February 22, 2025)
debian/sympa.postinst for the Debian Sympa package before 6.2.40~dfsg-7 uses mode 4755 for sympa_newaliases-wrapper, whereas the intended permissions are mode 4750 (for access by the sympa group)
Attacker Value
Unknown

CVE-2020-26880

Disclosure Date: October 07, 2020 (last updated February 22, 2025)
Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable.
Attacker Value
Unknown

CVE-2020-10936

Disclosure Date: May 27, 2020 (last updated February 21, 2025)
Sympa before 6.2.56 allows privilege escalation.
Attacker Value
Unknown

CVE-2020-9369

Disclosure Date: February 24, 2020 (last updated February 21, 2025)
Sympa 6.2.38 through 6.2.52 allows remote attackers to cause a denial of service (disk consumption from temporary files, and a flood of notifications to listmasters) via a series of requests with malformed parameters.
Attacker Value
Unknown

CVE-2018-1000671

Disclosure Date: September 06, 2018 (last updated November 27, 2024)
sympa version 6.2.16 and later contains a CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability in The "referer" parameter of the wwsympa.fcgi login action. that can result in Open redirection and reflected XSS via data URIs. This attack appear to be exploitable via Victim's browser must follow a URL supplied by the attacker. This vulnerability appears to have been fixed in none available.
0
Attacker Value
Unknown

CVE-2018-1000550

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
The Sympa Community Sympa version prior to version 6.2.32 contains a Directory Traversal vulnerability in wwsympa.fcgi template editing function that can result in Possibility to create or modify files on the server filesystem. This attack appear to be exploitable via HTTP GET/POST request. This vulnerability appears to have been fixed in 6.2.32.
0
Attacker Value
Unknown

CVE-2015-1306

Disclosure Date: January 22, 2015 (last updated October 05, 2023)
The newsletter posting area in the web interface in Sympa 6.0.x before 6.0.10 and 6.1.x before 6.1.24 allows remote attackers to read arbitrary files via unspecified vectors.
0
Attacker Value
Unknown

CVE-2012-2352

Disclosure Date: May 31, 2012 (last updated October 04, 2023)
The archive management (arc_manage) page in wwsympa/wwsympa.fcgi.in in Sympa before 6.1.11 does not check permissions, which allows remote attackers to list, read, and delete arbitrary list archives via vectors related to the (1) do_arc_manage, (2) do_arc_download, or (3) do_arc_delete functions.
0