CRLF injection vulnerability in Utils.py in Mailman before 2.1.9rc1 allows remote attackers to spoof messages in the error log and possibly trick the administrator into visiting malicious URLs via CRLF sequences in the URI.
Threat-Mapped Scoring
Score: 0.0
Priority: Unclassified
EPSS
Score: 0.02388 Percentile:
0.84348
CVSS Scoring
CVSS v2 Score: 2.6
Severity:
Mapped CWE(s)
CWE-94
: Improper Control of Generation of Code ('Code Injection')
All CAPEC(s)
CAPEC-242: Code Injection
CAPEC-35: Leverage Executable Code in Non-Executable Files
CAPEC-77: Manipulating User-Controlled Variables
CAPEC(s) with Mapped TTPs
CAPEC-35: Leverage Executable Code in Non-Executable Files
Mapped TTPs: