GNU Mailman before version 2.1.27 has a cross-site scripting flaw that allows malicious listowners to inject scripts into listinfo pages. Upstream Changelog: https://mail.python.org/pipermail/mailman-announce/2018-June/000236.html https://launchpad.net/mailman/+milestone/2.1.27 Reference: https://jvn.jp/en/jp/JVN00846677/
Created mailman tracking bugs for this issue: Affects: fedora-all [bug 1596459]
Upstream commits referencing JVN#00846677: https://bazaar.launchpad.net/~mailman-coders/mailman/2.1/revision/1747 https://bazaar.launchpad.net/~mailman-coders/mailman/2.1/revision/1754 https://bazaar.launchpad.net/~mailman-coders/mailman/2.1/revision/1783 https://bazaar.launchpad.net/~mailman-coders/mailman/2.1/revision/1785
A malicious list owners can inject scripts into the /mailman/listinfo page of a specially crafted list, due to not validated input in host_name field.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1054 https://access.redhat.com/errata/RHSA-2020:1054
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-0618