---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Bugzilla Multiple Vulnerabilities SECUNIA ADVISORY ID: SA22409 VERIFY ADVISORY: http://secunia.com/advisories/22409/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting, Manipulation of data, Exposure of sensitive information WHERE: >From remote SOFTWARE: Bugzilla 2.x http://secunia.com/product/396/ DESCRIPTION: Some vulnerabilities have been reported in Bugzilla, which can be exploited by malicious people or malicious users to disclose potentially sensitive information, conduct cross-site scripting, script insertion, and request forgery attacks. 1) Input passed to various fields and when embedded in

and

tags is not properly sanitised before being returned to users. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) An error when viewing attachments in "diff" mode allows users, who are not members of "insidergroup", to read the descriptions of all attachments. Additionally, when exporting bugs to the XML format, the "deadline" field is also visible for users, who are not member of the "timetrackinggroup" group. This can be exploited to gain knowledge of potentially sensitive information. 3) Bugzilla allows users to perform certain sensitive actions via HTTP GET and POST requests without verifying the user's request properly. This can be exploited to modify, delete, or create bugs. 4) Input passed to showdependencygraph.cgi is not properly sanitised before being returned to users. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. SOLUTION: Update to version 2.18.6, 2.20.3, 2.22.1, or 2.23.3. NOTE: Vulnerability #3 is fixed in versions 2.22.1 and 2.23.3 only. PROVIDED AND/OR DISCOVERED BY: 1) Frédéric Buclin and Gervase Markham 2) Frédéric Buclin and Josh "timeless" Soref 3) Gavin Shelley 4) Max Kanat-Alexander ORIGINAL ADVISORY: http://www.bugzilla.org/security/2.18.5/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------