what you don't know can hurt you

Bugzilla XSRF Randomization Vulnerability

Bugzilla XSRF Randomization Vulnerability
Posted Feb 3, 2009
Site bugzilla.org

Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, generated insufficiently random numbers, resulting in all random tokens being the same, all CSRF protection being defeated, and the new attachment_base functionality being compromised.

tags | advisory, csrf
MD5 | e15a8197fb7cfed55c0fce6cbaa4d74e

Bugzilla XSRF Randomization Vulnerability

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Summary
=======

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl,
generated insufficiently random numbers, resulting in all random
tokens being the same, all CSRF protection being defeated, and the
new attachment_base functionality being compromised. Only these
releases were affected--earlier releases are not affected.

All affected installations are encouraged to upgrade as soon as
possible.

Vulnerability Details
=====================

Class: Insufficiently Random Numbers
Versions: 3.2.1, 3.0.7, and 3.3.2
Fixed In: 3.2.2, 3.0.8, 3.3.3
Description: Bugzilla was calling srand() at compile time. Under
mod_perl, this led to all Apache children having the same
random seed, meaning that they all generated identical
"random" strings instead of actually random strings.

This means that all tokens were highly predictable, all
CSRF protection was easily circumvented, and any
installation using the new attachment_base functionality
could possibly have any private attachment viewed without
the user even logging in.

Versions before 3.2.1, 3.0.7, and 3.3.2 were not
affected. Installations that are not using mod_perl
for Bugzilla are not affected.

References: https://bugzilla.mozilla.org/show_bug.cgi?id=476594

Vulnerability Solutions
=======================

The fix for this issue in is included in the 3.3.3, 3.2.2, and 3.0.8
releases. Upgrading to a release with the relevant fix will protect
your installation from possible exploits of this issue.

Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:

http://www.bugzilla.org/download/


Credits
=======

The Bugzilla team wish to thank the following people/organizations for
their assistance in locating, advising us of, and assisting us to fix
these issues:

Philippe M. Chiasson
Dave Miller
Max Kanat-Alexander

General information about the Bugzilla bug-tracking system can be found
at:

http://www.bugzilla.org/

Comments and follow-ups can be directed to the mozilla.support.bugzilla
newsgroup or the support-bugzilla mailing list.
http://www.bugzilla.org/support/ has directions for accessing these
forums.

- --
Max Kanat-Alexander
Release Manager, Bugzilla Project
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkmIHcoACgkQaL2D/aEJPK4heQCgr6JIKQlgRWtUL+ISeOgWzCZ9
IIEAnA2nPUknQi0QIQuhzx59gL5LGcHd
=zVkI
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    12 Files
  • 4
    Jul 4th
    1 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    25 Files
  • 7
    Jul 7th
    35 Files
  • 8
    Jul 8th
    4 Files
  • 9
    Jul 9th
    9 Files
  • 10
    Jul 10th
    7 Files
  • 11
    Jul 11th
    4 Files
  • 12
    Jul 12th
    4 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close