A csrf_token value is not correctly checked against the right type of user when performing an admin operation. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover). Operations performed on the admin, admindb and edithtml pages should be validated only through CSRF tokens that are for the right type of user and not for every unprivileged user of mailman.
Created mailman tracking bugs for this issue: Affects: fedora-all [bug 2028499]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4916 https://access.redhat.com/errata/RHSA-2021:4916
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2021:4915 https://access.redhat.com/errata/RHSA-2021:4915
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:4913 https://access.redhat.com/errata/RHSA-2021:4913
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2021:5081 https://access.redhat.com/errata/RHSA-2021:5081
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:5080 https://access.redhat.com/errata/RHSA-2021:5080
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-44227