| VID |
21589 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Bugzilla bug-tracking system, according to its version number, has two information disclosure vulnerabilities. Bugzilla is a Web-based bug-tracking system, based on Perl and MySQL. Bugzilla versions 2.x prior to 2.16.9, 2.17.1 to 2.18, 2.19.1, and 2.19.2 are vulnerable to two information disclosure vulnerabilities as follows:
1) If a user is prompted to log in while attempting to view a chart, the user's password can be embedded in the report URL and thus become visible in the Web server logs. A remote attacker could exploit this vulnerability and obtain the user name and password from the Web server logs. 2) Another information disclosure vulnerability could allow a user to determine the existence of a product in the Bugzilla database even if it should not be visible to the user.
* Note: This check solely relied on the version number of Bugzilla installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://archives.neohapsis.com/archives/bugtraq/2005-05/0144.html https://bugzilla.mozilla.org/show_bug.cgi?id=287109 https://bugzilla.mozilla.org/show_bug.cgi?id=287436
* Platforms Affected: Mozilla Project, Bugzilla 2.x prior to 2.16.9 Mozilla Project, Bugzilla 2.17.1 to 2.18 Mozilla Project, Bugzilla 2.19.1 Mozilla Project, Bugzilla 2.19.2 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Bugzilla (2.16.9 or 2.18.1 or 2.19.3 or later), available from the Bugzilla Download Web site at http://www.bugzilla.org/download/ |
| Related URL |
CVE-2005-1563,CVE-2005-1565 (CVE) |
| Related URL |
13605,13606 (SecurityFocus) |
| Related URL |
20584,20586 (ISS) |
|