what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

bugzillaLeak.txt

bugzillaLeak.txt
Posted Jul 9, 2005
Authored by Joel Peshkin, Myk Melez, Frederic Buclin, Matthias Versen

Bugzilla versions prior to 2.18.2 are susceptible to multiple information leak vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 1508db168c61c8f0b39f934929e4aeb10bf23f34aa5611dc6f2552a578166bb2

bugzillaLeak.txt

Change Mirror Download
Summary
=======

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers two security bugs that have recently been
discovered and fixed in the Bugzilla code:

+ Any user can change a flag on any bug. This also allows the
attacker to expose the summary of any bug, even a hidden bug.

+ Summaries of private bugs are sometimes exposed under a very rare
condition if you use MySQL replication.

All Bugzilla installations are advised to upgrade to the latest stable
version of Bugzilla, 2.18.2.

Development snapshots of 2.19 and above are also vulnerable. If you are
using a development snapshot, you should upgrade to the release candidate
(2.20rc1), use CVS to update, or apply the patches from the specific
bugs listed below.


Vulnerability Details
=====================

Issue 1
-------
Class: Unauthorized Bug Change, Information Leak
Versions: 2.17.1 - 2.18.1, 2.19.1 - 2.19.3
Description: Any user can change any flag on any bug, even if they don't
have access to that bug, or even if they can't normally
make bug changes. This also allows them to expose the
summary of a bug.
By manually modifying a link to process_bug.cgi, it is possible
to change a flag on a bug that you do not have access to,
because Bugzilla does not validate that the flag you are
attempting to change is associated with the bug that you
are attempting to change.
If the attacker makes a flag change which causes the attacker
to be emailed, the attacker will see the summary of the bug
in that email.
If you are using the request_group or grant_group features
of 2.19, the attacker will be prevented from exploiting
this security hole if they do not have permission to
change the flag in the fashion that they are changing it.
Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=293159

Issue 2
-------
Class: Information Leak
Versions: 2.17.1 and above
Description: Bugs are inserted into the database before they are marked
as private, in Bugzilla code. Thus, MySQL replication can
lag in between the time that the bug is inserted and when
it is marked as private (usually less than a second). If
replication lags at this point, the bug summary will be
accessible to all users until replication catches up.
Also, on a very slow machine, there may be a pause
longer than a second that allows users to see the title of
the newly-filed bug.
Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=292544


Vulnerability Solutions
=======================

The fixes for all of the security bugs mentioned in this advisory
are included in the 2.18.2 and 2.20rc1 releases. Upgrading
to these releases will protect installations from possible exploits
of these issues.

Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:
http://www.bugzilla.org/download.html

Specific patches for each of the individual issues can be found on the
corresponding bug reports for each issue, at the URL given in the
reference for that issue in the list above.


Credits
=======

The Bugzilla team wish to thank the following people for their
assistance in locating, advising us of, and assisting us to fix
these situations:

Frédéric Buclin
Matthias Versen
Joel Peshkin
Myk Melez

General information about the Bugzilla bug-tracking system can be found
at http://www.bugzilla.org/

Comments and follow-ups can be directed to the
netscape.public.mozilla.webtools newsgroup or the mozilla-webtools
mailing list; http://www.bugzilla.org/support/ has directions for
accessing these forums.
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close