Description
|
|
Multiple vulnerabilities have been identified in Bugzilla, which could be exploited by attackers to bypass security restrictions, disclose sensitive information or manipulate certain data.
The first issue is caused due to the application calling "srand()" at compile time, which could cause identical random strings to be generated when using mod_perl, allowing an attacker to bypass CSRF protections or gain knowledge of sensitive information.
The second vulnerability is caused by an error when processing uploaded HTML or JavaScript attachments, which could allow malicious users to conduct cross site scripting attacks.
The third issue is caused by an error when processing calls to "process_bug.cgi" while updating a bug, which could be exploited to conduct cross site request forgery attacks.
The fourth vulnerability is caused due to the application not validating certain requests when deleting saved searches, keywords, or unused flags, or when updating user preferences, which could be exploited to conduct cross site request forgery attacks.
|