GLSA 200709-18: Bugzilla: Multiple vulnerabilities
Severity: | high |
Title: | Bugzilla: Multiple vulnerabilities |
Date: | 09/30/2007 |
Bugs: |
|
ID: | 200709-18 |
Synopsis
Bugzilla contains several vulnerabilities, some of them possibly leading to the remote execution of arbitrary code.Background
Bugzilla is a web application designed to help with managing software development.
Affected packages
Package | Vulnerable | Unaffected | Architecture(s) |
---|---|---|---|
www-apps/bugzilla | < 3.0.1 | >= 2.20.5 | All supported architectures |
Description
Masahiro Yamada found that from the 2.17.1 version, Bugzilla does not properly sanitize the content of the "buildid" parameter when filing bugs (CVE-2007-4543). The next two vulnerabilities only affect Bugzilla 2.23.3 or later, hence the stable Gentoo Portage tree does not contain these two vulnerabilities: Loic Minier reported that the "Email::Send::Sendmail()" function does not properly sanitise "from" email information before sending it to the "-f" parameter of /usr/sbin/sendmail (CVE-2007-4538), and Frederic Buclin discovered that the XML-RPC interface does not correctly check permissions in the time-tracking fields (CVE-2007-4539).
Impact
A remote attacker could trigger the "buildid" vulnerability by sending a specially crafted form to Bugzilla, leading to a persistent XSS, thus allowing for theft of credentials. With Bugzilla 2.23.3 or later, an attacker could also execute arbitrary code with the permissions of the web server by injecting a specially crafted "from" email address and gain access to normally restricted time-tracking information through the XML-RPC service.
Workaround
There is no known workaround at this time.
Resolution
All Bugzilla users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose www-apps/bugzilla
References
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.