lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <a05210508bacea4bb50e8@[192.168.1.203]>
Date: Fri, 25 Apr 2003 04:40:33 -0400
From: David Miller <justdave@...dicomm.com>
To: bugtraq@...urityfocus.com, announce@...zilla.org,
   mozilla-announce@...illa.org, mozilla-webtools@...illa.org
Subject: [BUGZILLA] Security Advisory - XSS, insecure temporary filenames


Bugzilla Security Advisory

April 24, 2003


Summary
=======

All Bugzilla installations are advised to upgrade to the latest stable
version of Bugzilla, 2.16.3, which was released today.

Development snapshots prior to version 2.17.4 are also affected, so if you
are using a development snapshot, you should obtain a newer one (2.17.4) or
use CVS to update.

This advisory covers multiple situations where unescaped raw HTML submitted by
users could be echoed back to the user, and a situation where temporary
files were not written to verified-unique filenames, thus exposing them to
potential symlink attacks by local users with sufficient permissions.


Vulnerability Details
=====================

The following three security issues were fixed in versions 2.16.3 and 2.17.4.

Multiple Cross-Site Scripting Vulnerabilities in Default Templates
------------------------------------------------------------------

Bugzilla output shown to end-users is generated via HTML templates.  One of
the core Bugzilla contributors recently contributed an automated tool which
detects failure-to-filter situations in the HTML templates - situations
where untrusted data was not properly filtered for HTML metacharacters
prior to outputting to end-users, allowing an attacker to insert a script
into the output by submitting data to the server in a specially formatted
manner.

Several exploitable instances were discovered in the default English
templates that are shipped with both 2.16.2 and 2.17.3 and have been closed
with this release.  We have received confirmation from the maintainers of
the German and Russian localized templates that corrected versions of those
templates sets should be available within 24 hours of this announcement for
the versions they support.  For corrected versions of other localizations,
please consult the localization's maintainer.

Bugzilla's output did not use HTML templates prior to version 2.16.

(Bugzilla Bug 192677 / BugTraq ID 6868)


Cross-Site Scripting vulnerability in local dependency graphs
-------------------------------------------------------------

Bugzilla contains a feature which allows users to generate visual graphs of
the dependency relationships between bugs.  In the past this was done by
using a remote server running the "Webdot" software.  In version 2.16, a
feature was introduced which provided the capability to use a
locally-installed copy of the GraphViz suite to generate the graph files
directly on the Bugzilla server instead of using a remote server.  This
option is not enabled by default.

Bugzilla does not properly escape the bug summaries placed in the ALT and
NAME attributes to the AREA tags in the client-side image map which is
generated to go with the visual graph.  This means an attacker could place
scripts in a graph by including a script in a specifically formatted manner
as part of a bug summary.

You are vulnerable if the "webdotbase" configuration parameter contains
a local pathname to an installation of "dot".

This bug is related to a feature added to Bugzilla in version 2.16, and
thus does not affect prior versions.

(Bugzilla Bug 192661 / BugTraq ID 6861)


Insecure Handling of Temporary Filenames
----------------------------------------

There are multiple places where Bugzilla creates temporary files in world-
or group-writable directories without verifying that the filename is
unused.  A user with local access to the server could potentially create a
properly-named symlink within those directories pointing at a file which
the webserver had access to, thus causing Bugzilla to overwrite that file.

These instances have been fixed in both 2.16.3 and 2.17.4 and affect all
prior versions of Bugzilla.

(Bugzilla Bug 197153 / BugTraq ID 7412)


Vulnerability Solutions
=======================

The fixes for all of the security bugs mentioned in this advisory are included
in the 2.16.3 and 2.17.4 releases.  Upgrading to these releases will
protect installations against exploitations of these security bugs.

Patches to upgrade Bugzilla to 2.16.3 are available at:
  http://ftp.mozilla.org/pub/webtools/
  (these patches are only valid for 2.16.2, 2.16.1, and 2.16 users).

Full release downloads and CVS upgrade instructions are available at:
  http://www.bugzilla.org/download.html

Links to the distribution sites of localized template sets can be found at:
  http://www.bugzilla.org/download.html#localizations


Credits
=======

The Bugzilla team wish to thank the following people for their assistance
in locating and advising us of these situations:

Jouni Heikniemi - for finding the XSS in local dependency graphs
Gervase Markham - for contributing the automated testing tool which
     located the XSS issues in the default template set
Jonathan Schatz - for discovering the insecure temporary filename handling


References
==========

Complete bug reports and the specific patches for the security bugs covered
herein may be obtained on the following bug reports:

   XSS in local dependency graphing:
   => http://bugzilla.mozilla.org/show_bug.cgi?id=192661

   XSS failure to filter in default templates:
   => http://bugzilla.mozilla.org/show_bug.cgi?id=192677

   Insecure handling of temporary filenames
   => http://bugzilla.mozilla.org/show_bug.cgi?id=197153

General information about the Bugzilla bug-tracking system can be found at
   http://www.bugzilla.org/

Comments and follow-ups can be directed to the
netscape.public.mozilla.webtools newsgroup or the mozilla-webtools mailing
list; http://www.mozilla.org/community.html has directions for accessing
these forums.

-30-
-- 
Dave Miller      Project Leader, Bugzilla Bug Tracking System
http://www.justdave.net/             http://www.bugzilla.org/



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ