| VID |
21470 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Bugzilla bug-tracking system, according to its version number, has an Internal Error Cross-Site Scripting Vulnerability. Bugzilla is a Web-based bug-tracking system, based on Perl and MySQL. Bugzilla versions 2.17 and earlier are vulnerable to a cross-site scripting attack when rendering internal errors containing user-supplied input. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the version number of Bugzilla installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/advisories/13701/
* Platforms Affected: Mozilla Project, Bugzilla versions 2.17 and earlier Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Bugzilla (2.18.0 or later), available from the Bugzilla Download Web site at http://www.bugzilla.org/download/
-- OR --
Apply the appropriate patch for this vulnerability, as listed in the Bugzilla Bug #27260 at https://bugzilla.mozilla.org/show_bug.cgi?id=272620 |
| Related URL |
CVE-2004-1061 (CVE) |
| Related URL |
12154 (SecurityFocus) |
| Related URL |
18728 (ISS) |
|