Bugzilla Unauthorized Access and Cross Site Scripting Vulnerabilities


Description   Multiple vulnerabilities have been identified in Bugzilla, which could be exploited by attackers to manipulate or gain knowledge of certain information, or gain unauthorized access. These issues are caused by access and input validation errors when processing user-supplied requests, which could allow attackers to gain unauthorized access to user accounts, or conduct cross-site scripting, cross-site request forgery, or HTTP response splitting attacks.
     
Vulnerable Products   Vulnerable Software:
Bugzilla versions prior to 3.2.10Bugzilla versions prior to 3.4.10Bugzilla versions prior to 3.6.4Bugzilla versions prior to 4.0rc2Bugzilla versions 2.x
     
Solution   Upgrade to Bugzilla version 3.2.10, 3.4.10, 3.6.4, or 4.0rc2 : http://www.bugzilla.org/download/
     
CVE   CVE-2011-0048
CVE-2011-0046
CVE-2010-4572
CVE-2010-4570
CVE-2010-4569
CVE-2010-4568
CVE-2010-4567
CVE-2010-4411
CVE-2010-2761
     
References   http://www.bugzilla.org/security/3.2.9/
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious tag with event found in data
3.2.0
HTTP Request Smuggling : HTTP command found in header
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - POST : suspicious 'object' tag found in data
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
3.2.0
XSS - Prevention - POST : 'location' javascript object found in data
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - POST : javascript code found in data
3.2.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
3.2.0
XSS - Prevention - POST : code allowing cookie access found in data
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
HTTP Request Smuggling : Content-Length and Transfer-Encoding: chunked fields in header
3.2.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - POST : suspicious 'div' tag found in data
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
HTTP Request Smuggling : suspicious syntax using HTTP keyword
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
HTTP Request Smuggling : multiple Content-Length fields
3.2.0
XSS - Prevention - POST : 'script' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2011-01-25 

 Target Type 
Client + Server 

 Possible exploit 
Local & Remote