[UNIX] Bugzilla Unauthorized Bug Modification And Information Disclosure Vulnerabilities
From: SecuriTeam (support_at_securiteam.com)
To: firstname.lastname@example.org Date: 26 Oct 2004 17:42:57 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Bugzilla Unauthorized Bug Modification And Information Disclosure
<http://www.bugzilla.org/> Bugzilla is a web-based bug (and enhancement)
tracking engine built over MySQL. It's often used for distributed Open
Source development, but is used by corporations (both internally and
externally) as well.
Three security bugs have been found in Bugzilla and are documented in this
advisory. The vulnerabilities range from private information disclosure to
unauthorized bug modifications possible by a third party.
* Bugzilla version 2.16 stable (bug modification only)
* Bugzilla version 2.18 release candidates (RCs, information leaks)
* Bugzilla versions 2.16.7 and 2.18rc3
Unauthorized Bug Modification
It is possible to send a carefully crafted HTTP POST message to
process_bug.cgi which will remove keywords from a bug even if you don't
have permissions to edit all bug fields (the "editbugs" permission). Such
changes are reported in "bug changed" email notifications, so they are
easily detected and reversed if someone abuses it.
Private User Comments and Attachment Summaries Leak In XML Bug Export
Exporting a bug to XML exposes user comments and attachment summaries
which are marked as private to users who are not members of the group
allowed to see private comments and attachments. XML export is not
exposed in the user interface, but is available to anyone who knows the
correct URL to invoke it. This only affects sites that use the
Private Metadata Changes For Attachments Information Leak
Changes to the metadata (filename, description, mime type, review flags)
on attachments which were flagged as private get displayed to users who
are not members of the group allowed to see private attachments when
viewing the bug activity log and when receiving bug change notification
mails. This only affects sites that use the 'insidergroup' feature.
Fixes for all security bugs mentioned in this advisory are included in the
2.16.7 and 2.18rc3 releases, and in the 2.19.1 development snapshot.
Upgrading to these releases will protect installations from possible
exploits of these issues.
Full release downloads, patches to upgrade Bugzilla to 2.16.7 from
previous 2.16.x versions, and CVS upgrade instructions are available at:
Specific patches for each of the individual issues can be found on the
corresponding bug reports for each issue, at the URL given in the
reference for that issue in the list above.
The information has been provided by <mailto:email@example.com> David
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: firstname.lastname@example.org
In order to subscribe to the mailing list, simply forward this email to: email@example.com
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.