CVE-2020-12137

moderate-risk
Published 2020-04-24

GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code.

Do I need to act?

~
5.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.1/10 Medium
NETWORK / LOW complexity

References (22)

Third Party Advisory https://usn.ubuntu.com/4348-1/
Third Party Advisory https://usn.ubuntu.com/4348-1/
and 2 more references
47
/ 100
moderate-risk
Severity 23/34 · High
Exploitability 8/34 · Low
Exposure 16/34 · Moderate