| VID |
21643 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Bugzilla bug-tracking system, according to its version number, has two information disclosure vulnerabilities(2). Bugzilla is a Web-based bug-tracking system, based on Perl and MySQL. Bugzilla versions 2.17.1 through 2.18.1 and 2.19.1 through 2.19.3 are vulnerable to two information disclosure vulnerabilities as follows:
1) A remote attacker can submit a specially crafted 'process_bug.cgi' URL to modify a flag on a bug that the attacker does not have access to. The script fails to validate that the flag modification is associated with the requested bug. 2) If a private bug is entered, a remote attacker may be able to obtain the summary or the title of the private bug while MySQL replication is in process.
* Note: This check solely relied on the version number of Bugzilla installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://archives.neohapsis.com/archives/bugtraq/2005-07/0114.html http://www.securitytracker.com/alerts/2005/Jul/1014428.html
* Platforms Affected: Mozilla, Bugzilla 2.17.1 though to 2.18.1 Mozilla, Bugzilla 2.19.1 though to 2.19.3 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Bugzilla (2.18.2 or 2.20rc1 or later), available from the Bugzilla Download Web site at http://www.bugzilla.org/download/ |
| Related URL |
CVE-2005-2173,CVE-2005-2174 (CVE) |
| Related URL |
14198,14200 (SecurityFocus) |
| Related URL |
21316,21319 (ISS) |
|