CVE-2021-34337 Affecting mailman3 package, versions <3.3.7-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (21st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-MAILMAN3-3136315
  • published1 Feb 2022
  • disclosed15 Apr 2023

Introduced: 1 Feb 2022

CVE-2021-34337  (opens in a new tab)

How to fix?

Upgrade Debian:12 mailman3 to version 3.3.7-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mailman3 package and not the mailman3 package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.

CVSS Base Scores

version 3.1