Hey folks.  I haven't see an official post here yet but as this has already 
gone out on at least one full-disclosure list I thought it worth mentioning 
since this will be an actively exploited 0 day:

http://lists.netsys.com/pipermail/full-disclosure/2005-February/031562.html

Basically, there is a path traversal issue with mailman 2.1.5 which will let 
you access any file that the Mailman user has read access to (at least under 
Apache 1.3, can't speak for other web servers).  I have tested this on a 
personal box and it does indeed work as advertised.

One temporary workaround is to stop access to "/mailman/private" via your web 
server configuration.  I would wait for a formal patch notice from the 
developers before patching the actual Mailman code.

Cheers,

Ron
------------------------------------------------------
Mailman-Users mailing list
Mailman-Users@python.org
http://mail.python.org/mailman/listinfo/mailman-users
Mailman FAQ: http://www.python.org/cgi-bin/faqw-mm.py
Searchable Archives: http://www.mail-archive.com/mailman-users%40python.org/
Unsubscribe: 
http://mail.python.org/mailman/options/mailman-users/archive%40jab.org

Security Policy: 
http://www.python.org/cgi-bin/faqw-mm.py?req=show&file=faq01.027.htp

Reply via email to