Multiple vulnerabilities in Mozilla Bugzilla



| Updated: 2020-08-11
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2011-2380
CVE-2011-2381
CVE-2011-2978
CVE-2011-2979
CWE-ID CWE-200
CWE-94
CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Bugzilla
Web applications / Other software

Vendor Mozilla

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Information disclosure

EUVDB-ID: #VU44823

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-2380

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

Bugzilla 2.23.3 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3 allows remote attackers to determine the existence of private group names via a crafted parameter during (1) bug creation or (2) bug editing.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Bugzilla: 2.22.7 - 4.1.2

CPE2.3 External links

https://secunia.com/advisories/45501
https://www.bugzilla.org/security/3.4.11/
https://www.debian.org/security/2011/dsa-2322
https://www.osvdb.org/74298
https://www.osvdb.org/74299
https://www.securityfocus.com/bid/49042
https://bugzilla.mozilla.org/show_bug.cgi?id=653477
https://exchange.xforce.ibmcloud.com/vulnerabilities/69034


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Code Injection

EUVDB-ID: #VU44824

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-2381

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

CRLF injection vulnerability in Bugzilla 2.17.1 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3 allows remote attackers to inject arbitrary e-mail headers via an attachment description in a flagmail notification.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Bugzilla: 2.17.1 - 4.1.2

CPE2.3 External links

https://secunia.com/advisories/45501
https://www.bugzilla.org/security/3.4.11/
https://www.debian.org/security/2011/dsa-2322
https://www.osvdb.org/74300
https://www.securityfocus.com/bid/49042
https://bugzilla.mozilla.org/show_bug.cgi?id=657158
https://exchange.xforce.ibmcloud.com/vulnerabilities/69035


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU44826

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-2978

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

Bugzilla 2.16rc1 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3 does not prevent changes to the confirmation e-mail address (aka old_email field) for e-mail change notifications, which makes it easier for remote attackers to perform arbitrary address changes by leveraging an unattended workstation.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Bugzilla: 2.16 - 4.1.2

CPE2.3 External links

https://secunia.com/advisories/45501
https://www.bugzilla.org/security/3.4.11/
https://www.debian.org/security/2011/dsa-2322
https://www.osvdb.org/74301
https://www.securityfocus.com/bid/49042
https://bugzilla.mozilla.org/show_bug.cgi?id=670868
https://exchange.xforce.ibmcloud.com/vulnerabilities/69036


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

EUVDB-ID: #VU44827

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-2979

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

Bugzilla 4.1.x before 4.1.3 generates different responses for certain assignee queries depending on whether the group name is valid, which allows remote attackers to determine the existence of private group names via a custom search. NOTE: this vulnerability exists because of a CVE-2010-2756 regression.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Bugzilla: 4.1 - 4.1.2

CPE2.3 External links

https://secunia.com/advisories/45501
https://www.bugzilla.org/security/3.4.11/
https://www.debian.org/security/2011/dsa-2322
https://www.osvdb.org/74298
https://www.osvdb.org/74299
https://www.securityfocus.com/bid/49042
https://bugzilla.mozilla.org/show_bug.cgi?id=674497
https://exchange.xforce.ibmcloud.com/vulnerabilities/69166


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###