|
Description
|
|
Multiple vulnerabilities have been identified in Bugzilla, which could be exploited by attackers to inject arbitrary scripting code and shell commands, or gain knowledge of sensitive information.
The first issue is caused by an error within the guided form when processing user-supplied data passed to the "buildid" field, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The second vulnerability is caused by an input validation error in the "Email::Send::Sendmail()" function when processing user-supplied arguments, which could be exploited by attackers to inject and execute arbitrary shell commands via the "email_in.pl" script.
The third issue is caused by an error in the WebService (XML-RPC) interface that does not restrict access to certain fields, which could be exploited by attackers to disclose sensitive information.
|