what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

bugzillaLeaks.txt

bugzillaLeaks.txt
Posted Oct 6, 2005
Authored by Joel Peshkin, Myk Melez, Frederic Buclin, Max Kanat-Alexander

Bugzilla versions below 2.20 are susceptible to multiple information leaks.

tags | advisory
SHA-256 | 57cd438a2820f029676c4439a217c2b29e6b506f7b887a2dd556c7fb869285db

bugzillaLeaks.txt

Change Mirror Download
Summary
=======

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers two security bugs that have recently been
discovered and fixed in the Bugzilla code:

+ config.cgi exposes information to users who aren't logged in, even
when "requirelogin" is turned on in Bugzilla.

+ It is possible to bypass the "user visibility groups" restrictions
if user-matching is turned on in "substring" mode.

All Bugzilla installations are advised to upgrade to the latest stable
version of Bugzilla, 2.20.

Development snapshots of 2.21 before 2.21.1 are also vulnerable. If you are
using a development snapshot, you should upgrade to 2.21.1, use CVS to update,
or apply the patches from the specific bugs listed below.

None of these vulnerabilities affect the old Bugzilla 2.16 branch.

Vulnerability Details
=====================

Issue 1
-------
Class: Information Leak
Versions: 2.18rc1 - 2.18.3, 2.19 - 2.20rc2, 2.21
Description: config.cgi gives JavaScript and RDF information about Bugzilla
to third-party clients, including a list of products in the
Bugzilla installation. The "requirelogin" parameter requires
that all people be logged into Bugzilla before seeing any data,
as a security measure.
In affected versions, config.cgi is always accessible, and
always contains information to non-logged-in users, even when
"requirelogin" is turned on, possibly exposing product names
that administrators expected to be confidential.
Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=308256


Issue 2
-------
Class: Information Leak
Versions: 2.19.1 - 2.20rc2, 2.21
Description: Bugzilla contains features to prevent users from "seeing" other
users, enabled by the "usevisibilitygroups" parameter. Bugzilla
also contains a feature called "user matching," which enables
users to type in part of a username and get back a list of
possible matches.
If user matching is turned on and is in "substring" mode,
all matching users will be returned to a query, regardless
of the visibility groups settings, exposing users who should
be invisible.
Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=308662


Vulnerability Solutions
=======================

The fixes for all of the security bugs mentioned in this advisory
are included in the 2.18.4, 2.20, and 2.21.1 releases. Upgrading
to these releases will protect installations from possible exploits
of these issues.

Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:
http://www.bugzilla.org/download/

Specific patches for each of the individual issues can be found on the
corresponding bug reports for each issue, at the URL given in the
reference for that issue in the list above.


Credits
=======

The Bugzilla team wish to thank the following people for their
assistance in locating, advising us of, and assisting us to fix
these situations:

Frédéric Buclin
Joel Peshkin
Myk Melez
Max Kanat-Alexander


General information about the Bugzilla bug-tracking system can be found
at http://www.bugzilla.org/

Comments and follow-ups can be directed to the
netscape.public.mozilla.webtools newsgroup or the mozilla-webtools
mailing list; http://www.bugzilla.org/support/ has directions for
accessing these forums.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close