------------------------------------------------------------ revno: 1844 fixes bug: https://launchpad.net/bugs/1873722 committer: Mark Sapiro <m...@msapiro.net> branch nick: 2.1 timestamp: Tue 2020-05-05 08:08:54 -0700 message: Fixed options login content injection vulnerability. modified: Mailman/Cgi/options.py NEWS
-- lp:mailman/2.1 https://code.launchpad.net/~mailman-coders/mailman/2.1 Your team Mailman Checkins is subscribed to branch lp:mailman/2.1. To unsubscribe from this branch go to https://code.launchpad.net/~mailman-coders/mailman/2.1/+edit-subscription
=== modified file 'Mailman/Cgi/options.py' --- Mailman/Cgi/options.py 2019-03-06 17:48:32 +0000 +++ Mailman/Cgi/options.py 2020-05-05 15:08:54 +0000 @@ -173,7 +173,7 @@ try: Utils.ValidateEmail(user) except Errors.EmailAddressError: - doc.addError(_('Illegal Email Address: %(safeuser)s')) + doc.addError(_('Illegal Email Address')) loginpage(mlist, doc, None, language) print doc.Format() return === modified file 'NEWS' --- NEWS 2020-04-26 03:16:14 +0000 +++ NEWS 2020-05-05 15:08:54 +0000 @@ -5,7 +5,12 @@ Here is a history of user visible changes to Mailman. -2.1.30-1 (xx-xxx-xxxx) +2.1.31 (05-May-2020) + + Security + + - A content injection vulnerability via the options login page has been + discovered and reported by Vishal Singh. This is fixed. (LP: #1873722) i18n
_______________________________________________ Mailman-checkins mailing list -- mailman-checkins@python.org To unsubscribe send an email to mailman-checkins-le...@python.org https://mail.python.org/mailman3/lists/mailman-checkins.python.org/ Member address: arch...@jab.org