FreeBSD : bugzilla -- multiple vulnerabilities (e135f0c9-375f-11e3-80b7-20cf30e32f6d)

medium Nessus Plugin ID 70485

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

A Bugzilla Security Advisory reports:Cross-Site Request Forgery When a user submits changes to a bug right after another user did, a midair collision page is displayed to inform the user about changes recently made. This page contains a token which can be used to validate the changes if the user decides to submit his changes anyway. A regression in Bugzilla 4.4 caused this token to be recreated if a crafted URL was given, even when no midair collision page was going to be displayed, allowing an attacker to bypass the token check and abuse a user to commit changes on his behalf. Cross-Site Request Forgery When an attachment is edited, a token is generated to validate changes made by the user. Using a crafted URL, an attacker could force the token to be recreated, allowing him to bypass the token check and abuse a user to commit changes on his behalf. Cross-Site Scripting Some parameters passed to editflagtypes.cgi were not correctly filtered in the HTML page, which could lead to XSS. Cross-Site Scripting Due to an incomplete fix for CVE-2012-4189, some incorrectly filtered field values in tabular reports could lead to XSS.

Solution

Update the affected packages.

See Also

https://bugzilla.mozilla.org/show_bug.cgi?id=911593

https://bugzilla.mozilla.org/show_bug.cgi?id=913904

https://bugzilla.mozilla.org/show_bug.cgi?id=924802

https://bugzilla.mozilla.org/show_bug.cgi?id=924932

http://www.nessus.org/u?d785d00c

Plugin Details

Severity: Medium

ID: 70485

File Name: freebsd_pkg_e135f0c9375f11e380b720cf30e32f6d.nasl

Version: 1.6

Type: local

Published: 10/18/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:bugzilla, p-cpe:/a:freebsd:freebsd:bugzilla40, p-cpe:/a:freebsd:freebsd:bugzilla42, p-cpe:/a:freebsd:freebsd:bugzilla44, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/17/2013

Vulnerability Publication Date: 10/16/2013

Reference Information

CVE: CVE-2013-1733, CVE-2013-1734, CVE-2013-1742, CVE-2013-1743