CVE-2018-1000550
Published: 5 September 2018
The Sympa Community Sympa version prior to version 6.2.32 contains a Directory Traversal vulnerability in wwsympa.fcgi template editing function that can result in Possibility to create or modify files on the server filesystem. This attack appear to be exploitable via HTTP GET/POST request. This vulnerability appears to have been fixed in 6.2.32.
Priority
Status
Package | Release | Status |
---|---|---|
sympa Launchpad, Ubuntu, Debian |
trusty |
Released
(6.1.17~dfsg-1ubuntu0.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
hirsute |
Not vulnerable
|
|
kinetic |
Not vulnerable
|
|
focal |
Not vulnerable
(6.2.40~dfsg-4)
|
|
groovy |
Not vulnerable
|
|
impish |
Not vulnerable
|
|
jammy |
Not vulnerable
|
|
upstream |
Released
(6.2.32~dfsg-1)
|
|
bionic |
Released
(6.2.24~dfsg-1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
xenial |
Released
(6.1.24~dfsg-1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
lunar |
Not vulnerable
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |