In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "1:2.1.20-1ubuntu0.6+esm2", "binary_name": "mailman" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-43332.json"
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:2.1.26-1ubuntu0.5", "binary_name": "mailman" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "1:2.1.29-1ubuntu3.1+esm1", "binary_name": "mailman" } ] }