lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050512122349.9525.qmail@www.securityfocus.com>
Date: 12 May 2005 12:23:49 -0000
From: Max Kanat-Alexander <mkanat@...zilla.org>
To: bugtraq@...urityfocus.com
Subject: Security Advisory for Bugzilla 2.18, 2.19.2, and 2.16.8




Summary
=======

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers two security bugs that have recently been
discovered and fixed in the Bugzilla code:

+ In all versions of Bugzilla since at least 2.16, it is possible
  to guess the name of a hidden product and have Bugzilla confirm that
  you were correct.
+ In Bugzilla 2.18 and above, a user's username and password are
  sometimes exposed in the URL after generating a Report.

All Bugzilla installations are advised to upgrade to the latest stable
version of Bugzilla, 2.18.1.

Development snapshots of 2.19 and above are also vulnerable. If you are
using a development snapshot, you should obtain a newer one (2.19.3)
or use CVS to update or apply the patches from the specific bugs listed
below.


Vulnerability Details
=====================

Issue 1
-------
Class:       Information Leak
Versions:    2.10 through 2.18, 2.19.1, 2.19.2
Description: If a user correctly guesses the name of a product that
             should be invisible to them, they will be specifically
             informed that they do not have access to it, thus letting
             them know that the product exists.
             Also, users can enter bugs into products that are closed for 
             bug entry, if they correctly guess the name of the product.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=287109

Issue 2
-------
Class:       User Password Embedded in URL
Versions:    2.17.1 through 2.18, 2.19.1, 2.19.2
Description: The user's password can be embedded as part of a report URL,
             and thus visible in the web server logs, if the user is
             prompted to log in while attempting to view a chart.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=287436


Vulnerability Solutions
=======================

The fixes for all of the security bugs mentioned in this advisory
are included in the 2.16.9, 2.18.1, and 2.19.3 releases.  Upgrading
to these releases will protect installations from possible exploits
of these issues.

Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:
  http://www.bugzilla.org/download.html

Specific patches for each of the individual issues can be found on the
corresponding bug reports for each issue, at the URL given in the
reference for that issue in the list above.


Credits
=======

The Bugzilla team wish to thank the following people for their
assistance in locating, advising us of, and assisting us to fix 
these situations:

Roman Pszonka
Gervase Markham
Frédéric Buclin
Myk Melez
Joel Peshkin


General information about the Bugzilla bug-tracking system can be found
at http://www.bugzilla.org/

Comments and follow-ups can be directed to the
netscape.public.mozilla.webtools newsgroup or the mozilla-webtools
mailing list; http://www.bugzilla.org/support/ has directions for
accessing these forums.


-Max Kanat-Alexander
Release Manager, Bugzilla Project


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ