Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2002-0008

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2002-0008
Last Modified 10 Sep 2008 03:11:02
Published 31 Jan 2002 12:00:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2002-0008

Summary

Bugzilla before 2.14.1 allows remote attackers to (1) spoof a user comment via an HTTP request to process_bug.cgi using the "who" parameter, instead of the Bugzilla_login cookie, or (2) post a bug as another user by modifying the reporter parameter to enter_bug.cgi, which is passed to post_bug.cgi.

Vulnerable Systems

Application

  • Mozilla Bugzilla 2.14.1


References

CONFIRM - http://www.bugzilla.org/security2_14_1.html

MISC - http://bugzilla.mozilla.org/show_bug.cgi?id=108516

MISC - http://bugzilla.mozilla.org/show_bug.cgi?id=108385

BUGTRAQ - 20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older

BID - 3794

BID - 3793

XF - bugzilla-processbug-comment-spoofing(7805)

XF - bugzilla-postbug-report-spoofing(7804)

REDHAT - RHSA-2002:001


Last Updated: 27 May 2016 10:36:44