what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

bugzilla-multiple.txt

bugzilla-multiple.txt
Posted Feb 6, 2007
Authored by Dave Miller, Frederic Buclin, Max Kanat-Alexander, Olav Vitters | Site bugzilla.org

Bugzilla Security Advisory - Bugzilla versions 2.20.1 and above suffer from a cross site scripting vulnerability. Version 2.23.3 suffers from a database password disclosure flaw.

tags | advisory, xss
SHA-256 | bd0c4a12dd51f408be7b023cc02ae95aab38c12993a36d47007d685ec3cac8a8

bugzilla-multiple.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Summary
=======

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers two security issues that have recently been
fixed in the Bugzilla code:

+ A possible cross-site scripting (XSS) vulnerability in Atom feeds
produced by Bugzilla.

+ Web server settings given by Bugzilla which provide security settings
to protect data files from access via the web are overridden by the
mod_perl startup script when running under mod_perl (development
snapshot only).

We strongly advise that 2.20.x users should upgrade to 2.20.4. 2.22
users, and users of 2.16.x or below, should upgrade to 2.22.2. Versions
2.18.x are not affected by either of these vulnerabilities.

Development snapshots of 2.23 before 2.23.4 are also vulnerable to all
of these issues. If you are using a development snapshot, you should
upgrade to 2.23.4, use CVS to update, or apply the patches from the
specific bugs listed below.

Vulnerability Details
=====================

Issue 1
- -------
Class: Cross-Site Scripting
Versions: 2.20.1 and above
Description: Bugzilla does not properly escape some fields in generated
Atom feeds, which leads to the potential for cross-site
scripting in feed readers that support javascript and
properly implement the Atom feed specification.
Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=367674

Issue 2
- -------
Class: Database password disclosure
Versions: 2.23.3 only
Description: Bugzilla development snapshot version 2.23.3 introduced
the ability to run Bugzilla under mod_perl on Apache.
The mod_perl initialization script included with Bugzilla
defines a new <Directory> block in the Apache configuration
for the directory containing Bugzilla. This block fails to
include permission for .htaccess files to override file
access permissions. The .htaccess file shipped with
Bugzilla prohibits access by web browsers to read the
localconfig file, which contains the username and password
for connecting to the database server.
If you are not running Bugzilla under mod_perl, then this
does not affect you.
Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=367071


Vulnerability Solutions
=======================

The fixes for all of the security bugs mentioned in this advisory are
included in the 2.20.4, 2.22.2, and 2.23.4 releases. Upgrading to these
releases will protect installations from possible exploits of these
issues.

Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:

http://www.bugzilla.org/download/

Specific patches for each of the individual issues can be found on the
corresponding bug reports for each issue, at the URL given in the
reference for that issue in the list above.


Credits
=======

The Bugzilla team wish to thank the following people for their
assistance in locating, advising us of, and assisting us to fix these
situations:

Frédéric Buclin
Dave Miller
Olav Vitters
Max Kanat-Alexander

General information about the Bugzilla bug-tracking system can be found
at:

http://www.bugzilla.org/

Comments and follow-ups can be directed to the mozilla.support.bugzilla
newsgroup or the support-bugzilla mailing list.
http://www.bugzilla.org/support/ has directions for accessing these
forums.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFw96laL2D/aEJPK4RAnNoAJ0R0Gz0Q8B5FkVx6NeMu5ReMtyhMACeOQ+P
AOlfSHsEKMJRrL1WV6Xl+VY=
=RcCp
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close