Information Exposure Affecting hyperkitty package, versions <1.3.4-4


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.44% (75th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-HYPERKITTY-1297158
  • published28 May 2021
  • disclosed26 May 2021

Introduced: 26 May 2021

CVE-2021-33038  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade Debian:unstable hyperkitty to version 1.3.4-4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream hyperkitty package and not the hyperkitty package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.

CVSS Scores

version 3.1