CVE-2021-33038: Exposure of sensitive information to an unauthorized actor in HyperKitty
(updated )
An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty prior to 1.3.5. When importing a private mailing list’s archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
References
- github.com/advisories/GHSA-h39g-q63v-4h9p
- github.com/pypa/advisory-database/tree/main/vulns/hyperkitty/PYSEC-2021-77.yaml
- gitlab.com/mailman/hyperkitty
- gitlab.com/mailman/hyperkitty/-/blob/master/doc/news.rst
- gitlab.com/mailman/hyperkitty/-/commit/9025324597d60b2dff740e49b70b15589d6804fa
- gitlab.com/mailman/hyperkitty/-/issues/380
- nvd.nist.gov/vuln/detail/CVE-2021-33038
- techblog.wikimedia.org/2021/06/11/discovering-and-fixing-cve-2021-33038-in-mailman3
- www.debian.org/security/2021/dsa-4922
Detect and mitigate CVE-2021-33038 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →