Sympa before 6.2.59b.2 allows remote attackers to obtain full SOAP API access by sending any arbitrary string (except one from an expired cookie) as the cookie value to authenticateAndRun.
References
Link | Resource |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976020 | Mailing List Third Party Advisory |
https://github.com/sympa-community/sympa/blob/6.2.59b.2/NEWS.md | Release Notes Third Party Advisory |
https://github.com/sympa-community/sympa/issues/1041 | Exploit Patch Third Party Advisory |
https://github.com/sympa-community/sympa/pull/1044 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/12/msg00026.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFZWDEKQFW3EH665OECDWIWM2MI7T53Y/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JICIHAJKKCZXJNIICUDYXGZFQCN6J4U6/ | |
https://www.debian.org/security/2020/dsa-4818 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-12-10T07:53:33
Updated: 2021-01-13T03:06:09
Reserved: 2020-12-10T00:00:00
Link: CVE-2020-29668
JSON object: View
NVD Information
Status : Modified
Published: 2020-12-10T08:15:11.410
Modified: 2023-11-07T03:21:33.323
Link: CVE-2020-29668
JSON object: View
Redhat Information
No data.