FreeBSD : Bugzilla security issues (54075861-a95a-11e5-8b40-20cf30e32f6d)

medium Nessus Plugin ID 87612

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Bugzilla Security Advisory

During the generation of a dependency graph, the code for the HTML image map is generated locally if a local dot installation is used.
With escaped HTML characters in a bug summary, it is possible to inject unfiltered HTML code in the map file which the CreateImagemap function generates. This could be used for a cross-site scripting attack.

If an external HTML page contains a <script> element with its src attribute pointing to a buglist in CSV format, some web browsers incorrectly try to parse the CSV file as valid JavaScript code. As the buglist is generated based on the privileges of the user logged into Bugzilla, the external page could collect confidential data contained in the CSV file.

Solution

Update the affected packages.

See Also

https://bugzilla.mozilla.org/show_bug.cgi?id=1221518

https://bugzilla.mozilla.org/show_bug.cgi?id=1232785

http://www.nessus.org/u?55880c19

Plugin Details

Severity: Medium

ID: 87612

File Name: freebsd_pkg_54075861a95a11e58b4020cf30e32f6d.nasl

Version: 2.7

Type: local

Published: 12/29/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:bugzilla44, p-cpe:/a:freebsd:freebsd:bugzilla50, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 12/23/2015

Vulnerability Publication Date: 12/22/2015

Reference Information

CVE: CVE-2015-8508, CVE-2015-8509