File CVE-2020-15011_inject_private_login.patch of Package mailman.15639

=== modified file 'Mailman/Cgi/private.py'
--- a/Mailman/Cgi/private.py
+++ b/Mailman/Cgi/private.py
@@ -146,13 +146,9 @@ def main():
             if mlist.isMember(username):
                 mlist.MailUserPassword(username)
             elif username:
-                # Not a member
-                if mlist.private_roster == 0:
-                    # Public rosters
-                    safeuser = Utils.websafe(username)
-                    message = Bold(FontSize('+1',
-                                  _('No such member: %(safeuser)s.'))).Format()
-                else:
+                # Not a member. Don't report address in any case. It leads to
+                # Content injection. Just log if roster is not public.
+                if mlist.private_roster != 0:
                     syslog('mischief',
                        'Reminder attempt of non-member w/ private rosters: %s',
                        username)
openSUSE Build Service is sponsored by