TITLE: Mailman Cross-Site Scripting and Weak Password Generation SECUNIA ADVISORY ID: SA13603 VERIFY ADVISORY: http://secunia.com/advisories/13603/ CRITICAL: Less critical IMPACT: Cross Site Scripting, Brute force WHERE: >From remote SOFTWARE: Mailman 2.x http://secunia.com/product/1010/ DESCRIPTION: A vulnerability and a weakness have been reported in Mailman, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially brute force a user's password. 1) Input is not properly sanitised by "scripts/driver" when returning error pages. This can be exploited to execute arbitrary HTML or script code in a user's browser session in context of a vulnerable site by tricking a user into visiting a malicious web site or follow a specially crafted link. 2) A weakness in the algorithm of the automatic password generation causes only about five million different passwords to be generated. This makes it easier to brute force automatically generated passwords. SOLUTION: 1) Filter malicious characters and character sequences in a proxy or firewall with URL filtering capabilities. 2) Choose a strong password for subscriptions, instead of letting Mailman generate one. PROVIDED AND/OR DISCOVERED BY: 1) Florian Weimer 2) ZENDAS ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------