------------------------------------------------------------
revno: 1844
fixes bug: https://launchpad.net/bugs/1873722
committer: Mark Sapiro <m...@msapiro.net>
branch nick: 2.1
timestamp: Tue 2020-05-05 08:08:54 -0700
message:
  Fixed options login content injection vulnerability.
modified:
  Mailman/Cgi/options.py
  NEWS


--
lp:mailman/2.1
https://code.launchpad.net/~mailman-coders/mailman/2.1

Your team Mailman Checkins is subscribed to branch lp:mailman/2.1.
To unsubscribe from this branch go to 
https://code.launchpad.net/~mailman-coders/mailman/2.1/+edit-subscription
=== modified file 'Mailman/Cgi/options.py'
--- Mailman/Cgi/options.py	2019-03-06 17:48:32 +0000
+++ Mailman/Cgi/options.py	2020-05-05 15:08:54 +0000
@@ -173,7 +173,7 @@
     try:
         Utils.ValidateEmail(user)
     except Errors.EmailAddressError:
-        doc.addError(_('Illegal Email Address: %(safeuser)s'))
+        doc.addError(_('Illegal Email Address'))
         loginpage(mlist, doc, None, language)
         print doc.Format()
         return

=== modified file 'NEWS'
--- NEWS	2020-04-26 03:16:14 +0000
+++ NEWS	2020-05-05 15:08:54 +0000
@@ -5,7 +5,12 @@
 
 Here is a history of user visible changes to Mailman.
 
-2.1.30-1 (xx-xxx-xxxx)
+2.1.31 (05-May-2020)
+
+  Security
+
+    - A content injection vulnerability via the options login page has been
+      discovered and reported by Vishal Singh. This is fixed.  (LP: #1873722)
 
   i18n
 

_______________________________________________
Mailman-checkins mailing list -- mailman-checkins@python.org
To unsubscribe send an email to mailman-checkins-le...@python.org
https://mail.python.org/mailman3/lists/mailman-checkins.python.org/
Member address: arch...@jab.org

Reply via email to