Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: 2322-1: bugzilla: Multiple vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Several vulnerabilities were discovered in Bugzilla, a web-based bug tracking system. CVE-2010-4572 [More...]
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2322-1                                 Jonathan Wiltshire
October 10, 2011             
- -------------------------------------------------------------------------

Package        : bugzilla
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-201-2979 CVE-2010-4567 CVE-2010-4568 CVE-2010-4572 
                 CVE-2011-0046 CVE-2011-0048 CVE-2011-2379 CVE-2011-2380 
                 CVE-2011-2381 CVE-2011-2978 

Several vulnerabilities were discovered in Bugzilla, a web-based bug
tracking system.


  By inserting particular strings into certain URLs, it was
  possible to inject both headers and content to any

CVE-2010-4567, CVE-2011-0048

  Bugzilla has a "URL" field that can contain several types
  of URL, including "javascript:" and "data:" URLs. However,
  it does not make "javascript:" and "data:" URLs into
  clickable links, to protect against cross-site scripting
  attacks or other attacks. It was possible to bypass this
  protection by adding spaces into the URL in places that
  Bugzilla did not expect them. Also, "javascript:" and
  "data:" links were *always* shown as clickable to
  logged-out users.


  It was possible for a user to gain unauthorized access to
  any Bugzilla account in a very short amount of time (short
  enough that the attack is highly effective).


  Various pages were vulnerable to Cross-Site Request
  Forgery attacks. Most of these issues are not as serious
  as previous CSRF vulnerabilities.


  When a user changes his email address, Bugzilla trusts
  a user-modifiable field for obtaining the current e-mail
  address to send a confirmation message to. If an attacker
  has access to the session of another user (for example,
  if that user left their browser window open in a public
  place), the attacker could alter this field to cause
  the email-change notification to go to their own address.
  This means that the user would not be notified that his
  account had its email address changed by the attacker.


  For flagmails only, attachment descriptions with a newline
  in them could lead to the injection of crafted headers in
  email notifications when an attachment flag is edited.


  Bugzilla uses an alternate host for attachments when
  viewing them in raw format to prevent cross-site scripting
  attacks. This alternate host is now also used when viewing
  patches in "Raw Unified" mode because Internet Explorer 8
  and older, and Safari before 5.0.6 do content sniffing,
  which could lead to the execution of malicious code.

CVE-2011-2380 CVE-201-2979

  Normally, a group name is confidential and is only visible
  to members of the group, and to non-members if the group
  is used in bugs. By crafting the URL when creating or
  editing a bug, it was possible to guess if a group existed
  or not, even for groups which weren't used in bugs and so
  which were supposed to remain confidential.

For the oldstable distribution (lenny), it has not been practical to
backport patches to fix these bugs. Users of bugzilla on lenny are 
strongly advised to upgrade to the version in the squeeze distribution.

For the stable distribution (squeeze), these problems have been fixed in

For the testing distribution (wheezy) and the unstable distribution (sid),
the bugzilla packages have been removed.

We recommend that you upgrade your bugzilla packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:

Mailing list:

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.