Bugzilla < 3.6.10 / 4.0.7 / 4.2.2 / 4.3.2 Multiple Information Disclosures

medium Nessus Plugin ID 61650

Synopsis

The remote web server contains a CGI application that suffers from multiple information disclosure vulnerabilities.

Description

According to its banner, the version of Bugzilla installed on the remote host is affected by multiple information disclosure vulnerabilities :

- In HTML bugmails, all bug IDs and attachment IDs are linkified, and hovering these links displays a tooltip with the bug summary or the attachment description if the user is allowed to see the bug or attachment. But when validating user permissions when generating the email, the permissions of the user who edited the bug were taken into account instead of the permissions of the addressee. This means that confidential information could be disclosed to the addressee if the other user has more privileges than the addressee. (CVE-2012-1968)

- The description of a private attachment could be visible to a user without permissions to access the attachment if the attachment ID is mentioned in a public comment that the user can see. (CVE-2012-1969)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Bugzilla 3.6.10 / 4.0.7 / 4.2.2 / 4.3.2 or later.

See Also

https://www.bugzilla.org/security/3.6.9/

https://seclists.org/bugtraq/2012/Jul/153

Plugin Details

Severity: Medium

ID: 61650

File Name: bugzilla_3_6_10.nasl

Version: 1.11

Type: remote

Family: CGI abuses

Published: 8/23/2012

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:mozilla:bugzilla

Required KB Items: installed_sw/Bugzilla, Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/26/2012

Vulnerability Publication Date: 7/26/2012

Reference Information

CVE: CVE-2012-1968, CVE-2012-1969

BID: 54708