FreeBSD : bugzilla -- multiple serious vulnerabilities (c8c927e5-2891-11e0-8f26-00151735203a)

High Nessus Plugin ID 51670


The remote FreeBSD host is missing a security-related update.


A Bugzilla Security Advisory reports :

This advisory covers three security issues that have recently been fixed in the Bugzilla code :

- A weakness in Bugzilla could allow a user to gain unauthorized access to another Bugzilla account.

- A weakness in the Perl module allows injecting HTTP headers and content to users via several pages in Bugzilla.

- If you put a harmful 'javascript:' or 'data:' URL into Bugzilla's 'URL' field, then there are multiple situations in which Bugzilla will unintentionally make that link clickable.

- Various pages lack protection against cross-site request forgeries.

All affected installations are encouraged to upgrade as soon as possible.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 51670

File Name: freebsd_pkg_c8c927e5289111e08f2600151735203a.nasl

Version: 1.10

Type: local

Published: 2011/01/26

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:bugzilla, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/01/25

Vulnerability Publication Date: 2011/01/24

Reference Information

CVE: CVE-2010-0048, CVE-2010-2761, CVE-2010-4411, CVE-2010-4567, CVE-2010-4568, CVE-2010-4572, CVE-2011-0046

BID: 25425