Lucene search

K
cveRedhatCVE-2008-6098
HistoryFeb 09, 2009 - 6:30 p.m.

CVE-2008-6098

2009-02-0918:30:00
CWE-264
redhat
web.nvd.nist.gov
29
bugzilla
cve-2008-6098
remote authentication
moderation bypass

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

AI Score

6.1

Confidence

Low

EPSS

0.004

Percentile

73.5%

Bugzilla 3.2 before 3.2 RC2, 3.0 before 3.0.6, 2.22 before 2.22.6, 2.20 before 2.20.7, and other versions after 2.17.4 allows remote authenticated users to bypass moderation to approve and disapprove quips via a direct request to quips.cgi with the action parameter set to “approve.”

Affected configurations

Nvd
Node
mozillabugzillaMatch2.17.4
OR
mozillabugzillaMatch2.17.5
OR
mozillabugzillaMatch2.17.6
OR
mozillabugzillaMatch2.17.7
OR
mozillabugzillaMatch2.18
OR
mozillabugzillaMatch2.18rc1
OR
mozillabugzillaMatch2.18rc2
OR
mozillabugzillaMatch2.18rc3
OR
mozillabugzillaMatch2.18.1
OR
mozillabugzillaMatch2.18.2
OR
mozillabugzillaMatch2.18.3
OR
mozillabugzillaMatch2.18.4
OR
mozillabugzillaMatch2.18.5
OR
mozillabugzillaMatch2.18.6
OR
mozillabugzillaMatch2.18.7
OR
mozillabugzillaMatch2.18.8
OR
mozillabugzillaMatch2.18.9
OR
mozillabugzillaMatch2.19
OR
mozillabugzillaMatch2.19.1
OR
mozillabugzillaMatch2.19.2
OR
mozillabugzillaMatch2.19.3
OR
mozillabugzillaMatch2.20
OR
mozillabugzillaMatch2.20rc1
OR
mozillabugzillaMatch2.20rc2
OR
mozillabugzillaMatch2.20.1
OR
mozillabugzillaMatch2.20.2
OR
mozillabugzillaMatch2.20.3
OR
mozillabugzillaMatch2.20.4
OR
mozillabugzillaMatch2.20.5
OR
mozillabugzillaMatch2.20.6
OR
mozillabugzillaMatch2.21
OR
mozillabugzillaMatch2.21.1
OR
mozillabugzillaMatch2.21.2
OR
mozillabugzillaMatch2.22
OR
mozillabugzillaMatch2.22rc1
OR
mozillabugzillaMatch2.22.1
OR
mozillabugzillaMatch2.22.2
OR
mozillabugzillaMatch2.22.3
OR
mozillabugzillaMatch2.22.4
OR
mozillabugzillaMatch2.22.5
OR
mozillabugzillaMatch2.22.6
OR
mozillabugzillaMatch2.23
OR
mozillabugzillaMatch2.23.1
OR
mozillabugzillaMatch2.23.2
OR
mozillabugzillaMatch2.23.3
OR
mozillabugzillaMatch2.23.4
OR
mozillabugzillaMatch3.0.0
OR
mozillabugzillaMatch3.0.1
OR
mozillabugzillaMatch3.0.2
OR
mozillabugzillaMatch3.0.3
OR
mozillabugzillaMatch3.0.4
OR
mozillabugzillaMatch3.0.5
OR
mozillabugzillaMatch3.0.6
OR
mozillabugzillaMatch3.0.7
OR
mozillabugzillaMatch3.0_rc1
OR
mozillabugzillaMatch3.1.0
OR
mozillabugzillaMatch3.1.1
OR
mozillabugzillaMatch3.1.2
OR
mozillabugzillaMatch3.1.3
OR
mozillabugzillaMatch3.1.4
OR
mozillabugzillaMatch3.2
OR
mozillabugzillaMatch3.2.1
OR
mozillabugzillaMatch3.3.1
OR
mozillabugzillaMatch3.3.2
VendorProductVersionCPE
mozillabugzilla2.17.4cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*
mozillabugzilla2.17.5cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*
mozillabugzilla2.17.6cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*
mozillabugzilla2.17.7cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*
mozillabugzilla2.18cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*
mozillabugzilla2.18cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*
mozillabugzilla2.18cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*
mozillabugzilla2.18cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*
mozillabugzilla2.18.1cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*
mozillabugzilla2.18.2cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*
Rows per page:
1-10 of 641

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

AI Score

6.1

Confidence

Low

EPSS

0.004

Percentile

73.5%