FreeBSD : Bugzilla security issues (54075861-a95a-11e5-8b40-20cf30e32f6d)

Medium Nessus Plugin ID 87612


The remote FreeBSD host is missing one or more security-related updates.


Bugzilla Security Advisory

During the generation of a dependency graph, the code for the HTML image map is generated locally if a local dot installation is used.
With escaped HTML characters in a bug summary, it is possible to inject unfiltered HTML code in the map file which the CreateImagemap function generates. This could be used for a cross-site scripting attack.

If an external HTML page contains a <script> element with its src attribute pointing to a buglist in CSV format, some web browsers incorrectly try to parse the CSV file as valid JavaScript code. As the buglist is generated based on the privileges of the user logged into Bugzilla, the external page could collect confidential data contained in the CSV file.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 87612

File Name: freebsd_pkg_54075861a95a11e58b4020cf30e32f6d.nasl

Version: $Revision: 2.4 $

Type: local

Published: 2015/12/29

Modified: 2016/10/19

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N


Base Score: 4.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:bugzilla44, p-cpe:/a:freebsd:freebsd:bugzilla50, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2015/12/23

Vulnerability Publication Date: 2015/12/22

Reference Information

CVE: CVE-2015-8508, CVE-2015-8509