Bugzilla show_bug.cgi id Parameter XSS

This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a CGI application that if affected by a
cross-site scripting vulnerability.

Description :

The version of Bugzilla installed on the remote host is affected by a
cross-site scripting vulnerability because it fails to properly
sanitize user-supplied input to the 'id' parameter of the
'show_bug.cgi' script. An attacker may be able to leverage this to
inject arbitrary HTML and script code into a user's browser to be
executed within the security context of the affected site.

Note that the install is also likely to be affected by an information
disclosure vulnerability; however, Nessus has not tested for this.

See also :

https://bugzilla.mozilla.org/show_bug.cgi?id=842038
http://www.bugzilla.org/security/3.6.12/

Solution :

Upgrade to Bugzilla 3.6.13 / 4.0.10 / 4.2.5 / 4.4rc2 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 64877 ()

Bugtraq ID: 58060

CVE ID: CVE-2013-0785

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now