----------------------------------------------------------------------
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts.
We will help with relocation and obtaining a work permit.
Currently the following type of positions are available:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
----------------------------------------------------------------------
TITLE:
Bugzilla Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA22409
VERIFY ADVISORY:
http://secunia.com/advisories/22409/
CRITICAL:
Moderately critical
IMPACT:
Cross Site Scripting, Manipulation of data, Exposure of sensitive
information
WHERE:
>From remote
SOFTWARE:
Bugzilla 2.x
http://secunia.com/product/396/
DESCRIPTION:
Some vulnerabilities have been reported in Bugzilla, which can be
exploited by malicious people or malicious users to disclose
potentially sensitive information, conduct cross-site scripting,
script insertion, and request forgery attacks.
1) Input passed to various fields and when embedded in
and
tags is not properly sanitised before being returned to users. This
can be exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.
2) An error when viewing attachments in "diff" mode allows users, who
are not members of "insidergroup", to read the descriptions of all
attachments. Additionally, when exporting bugs to the XML format, the
"deadline" field is also visible for users, who are not member of the
"timetrackinggroup" group. This can be exploited to gain knowledge of
potentially sensitive information.
3) Bugzilla allows users to perform certain sensitive actions via
HTTP GET and POST requests without verifying the user's request
properly. This can be exploited to modify, delete, or create bugs.
4) Input passed to showdependencygraph.cgi is not properly sanitised
before being returned to users. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site.
SOLUTION:
Update to version 2.18.6, 2.20.3, 2.22.1, or 2.23.3.
NOTE: Vulnerability #3 is fixed in versions 2.22.1 and 2.23.3 only.
PROVIDED AND/OR DISCOVERED BY:
1) Frédéric Buclin and Gervase Markham
2) Frédéric Buclin and Josh "timeless" Soref
3) Gavin Shelley
4) Max Kanat-Alexander
ORIGINAL ADVISORY:
http://www.bugzilla.org/security/2.18.5/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------