Bugzilla < 4.0.16 / 4.2.12 / 4.4.7 / 5.0rc1 Multiple Vulnerabilities

medium Nessus Plugin ID 81424

Synopsis

The remote web server contains a web application that is affected by multiple vulnerabilities.

Description

According to its banner, the version of Bugzilla running on the remote host is potentially affected by the following vulnerabilities :

- A command injection vulnerability exists due to a failure to properly utilize the 3 arguments form for open(). This allows an authenticated, remote attacker with 'editcomponents' permission, to inject commands into attributes. (CVE-2014-8630)

- An information disclosure vulnerability exists in the WebServices API. An attacker can execute imported functions from non-WebServices modules.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Bugzilla 4.0.16 / 4.2.12 / 4.4.7 / 5.0rc1 or later.

See Also

https://www.bugzilla.org/security/4.0.15/

https://bugzilla.mozilla.org/show_bug.cgi?id=1079065

https://bugzilla.mozilla.org/show_bug.cgi?id=1090275

Plugin Details

Severity: Medium

ID: 81424

File Name: bugzilla_5_0_rc1.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 2/20/2015

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:mozilla:bugzilla

Required KB Items: installed_sw/Bugzilla, Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No known exploits are available

Patch Publication Date: 1/21/2015

Vulnerability Publication Date: 1/21/2015

Reference Information

CVE: CVE-2014-8630

BID: 72525