Exposure of sensitive information to an unauthorized actor in HyperKitty
High severity
GitHub Reviewed
Published
Jun 1, 2021
to the GitHub Advisory Database
•
Updated Sep 23, 2024
Description
Published by the National Vulnerability Database
May 26, 2021
Reviewed
Jun 1, 2021
Published to the GitHub Advisory Database
Jun 1, 2021
Last updated
Sep 23, 2024
An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty prior to 1.3.5. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
References