FreeBSD : bugzilla -- multiple vulnerabilities (309542b5-50b9-11e1-b0d8-00151735203a)

This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A Bugzilla Security Advisory reports :

The following security issues have been discovered in Bugzilla :

- Account Impersonation : When a user creates a new account, Bugzilla
doesn't correctly reject email addresses containing non-ASCII
characters, which could be used to impersonate another user account.
Such email addresses could look visually identical to other valid
email addresses, and an attacker could try to confuse other users and
be added to bugs he shouldn't have access to.

- Cross-Site Request Forgery : Due to a lack of validation of the
Content-Type head when making POST requests to jsonrpc.cgi, a possible
CSRF vulnerability was discovered. If a user visits an HTML page with
some malicious JS code in it, an attacker could make changes to a
remote Bugzilla installation on behalf of the victim's account by
using the JSON-RPC API. The user would have had to be already logged
in to the target site for the vulnerability to work.

All affected installations are encouraged to upgrade as soon as
possible.

See also :

https://bugzilla.mozilla.org/show_bug.cgi?id=714472
https://bugzilla.mozilla.org/show_bug.cgi?id=718319
http://www.nessus.org/u?bc98e39e

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.1
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 57852 ()

Bugtraq ID:

CVE ID: CVE-2012-0440
CVE-2012-0448

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now