Lucene search

K
cveMitreCVE-2010-2756
HistoryAug 16, 2010 - 3:14 p.m.

CVE-2010-2756

2010-08-1615:14:12
CWE-264
mitre
web.nvd.nist.gov
33
cve-2010-2756
bugzilla
remote attackers
group memberships
nvd
security vulnerability

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

6.4

Confidence

Low

EPSS

0.02

Percentile

89.0%

Search.pm in Bugzilla 2.19.1 through 3.2.7, 3.3.1 through 3.4.7, 3.5.1 through 3.6.1, and 3.7 through 3.7.2 allows remote attackers to determine the group memberships of arbitrary users via vectors involving the Search interface, boolean charts, and group-based pronouns.

Affected configurations

Nvd
Node
mozillabugzillaMatch2.2
OR
mozillabugzillaMatch2.4
OR
mozillabugzillaMatch2.6
OR
mozillabugzillaMatch2.8
OR
mozillabugzillaMatch2.9
OR
mozillabugzillaMatch2.19.1
OR
mozillabugzillaMatch2.19.2
OR
mozillabugzillaMatch2.19.3
OR
mozillabugzillaMatch2.20
OR
mozillabugzillaMatch2.20rc1
OR
mozillabugzillaMatch2.20rc2
OR
mozillabugzillaMatch2.20.1
OR
mozillabugzillaMatch2.20.2
OR
mozillabugzillaMatch2.20.3
OR
mozillabugzillaMatch2.20.4
OR
mozillabugzillaMatch2.20.5
OR
mozillabugzillaMatch2.20.6
OR
mozillabugzillaMatch2.20.7
OR
mozillabugzillaMatch2.21
OR
mozillabugzillaMatch2.21.1
OR
mozillabugzillaMatch2.21.2
OR
mozillabugzillaMatch2.22
OR
mozillabugzillaMatch2.22rc1
OR
mozillabugzillaMatch2.22.1
OR
mozillabugzillaMatch2.22.3
OR
mozillabugzillaMatch2.22.4
OR
mozillabugzillaMatch2.22.5
OR
mozillabugzillaMatch2.22.6
OR
mozillabugzillaMatch2.22.7
OR
mozillabugzillaMatch2.23
OR
mozillabugzillaMatch2.23.1
OR
mozillabugzillaMatch2.23.2
OR
mozillabugzillaMatch2.23.3
OR
mozillabugzillaMatch2.23.4
OR
mozillabugzillaMatch3.0
OR
mozillabugzillaMatch3.0rc1
OR
mozillabugzillaMatch3.0.0
OR
mozillabugzillaMatch3.0.1
OR
mozillabugzillaMatch3.0.2
OR
mozillabugzillaMatch3.0.3
OR
mozillabugzillaMatch3.0.4
OR
mozillabugzillaMatch3.0.5
OR
mozillabugzillaMatch3.0.6
OR
mozillabugzillaMatch3.0.7
OR
mozillabugzillaMatch3.0.8
OR
mozillabugzillaMatch3.0.9
OR
mozillabugzillaMatch3.0.10
OR
mozillabugzillaMatch3.0.11
OR
mozillabugzillaMatch3.1.0
OR
mozillabugzillaMatch3.1.1
OR
mozillabugzillaMatch3.1.2
OR
mozillabugzillaMatch3.1.3
OR
mozillabugzillaMatch3.2
OR
mozillabugzillaMatch3.2.2
OR
mozillabugzillaMatch3.2.3
OR
mozillabugzillaMatch3.2.4
OR
mozillabugzillaMatch3.2.5
OR
mozillabugzillaMatch3.2.6
OR
mozillabugzillaMatch3.2.7
OR
mozillabugzillaMatch3.3.1
OR
mozillabugzillaMatch3.3.2
OR
mozillabugzillaMatch3.3.3
OR
mozillabugzillaMatch3.3.4
OR
mozillabugzillaMatch3.4.1
OR
mozillabugzillaMatch3.4.2
OR
mozillabugzillaMatch3.4.3
OR
mozillabugzillaMatch3.4.4
OR
mozillabugzillaMatch3.4.5
OR
mozillabugzillaMatch3.4.6
OR
mozillabugzillaMatch3.4.7
OR
mozillabugzillaMatch3.5.1
OR
mozillabugzillaMatch3.5.2
OR
mozillabugzillaMatch3.5.3
OR
mozillabugzillaMatch3.6
OR
mozillabugzillaMatch3.6.1
OR
mozillabugzillaMatch3.7
OR
mozillabugzillaMatch3.7.1
OR
mozillabugzillaMatch3.7.2
VendorProductVersionCPE
mozillabugzilla2.2cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*
mozillabugzilla2.4cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*
mozillabugzilla2.6cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*
mozillabugzilla2.8cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*
mozillabugzilla2.9cpe:2.3:a:mozilla:bugzilla:2.9:*:*:*:*:*:*:*
mozillabugzilla2.19.1cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*
mozillabugzilla2.19.2cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*
mozillabugzilla2.19.3cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*
mozillabugzilla2.20cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*
mozillabugzilla2.20cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*
Rows per page:
1-10 of 781

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

6.4

Confidence

Low

EPSS

0.02

Percentile

89.0%