Lucene search

K
cveMozillaCVE-2014-8630
HistoryFeb 01, 2015 - 3:59 p.m.

CVE-2014-8630

2015-02-0115:59:04
CWE-77
mozilla
web.nvd.nist.gov
38
bugzilla
cve-2014-8630
command execution
remote code execution
information security

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

AI Score

7.1

Confidence

Low

EPSS

0.003

Percentile

72.1%

Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name.

Affected configurations

Nvd
Node
mozillabugzillaRange4.0.16
OR
mozillabugzillaMatch4.1
OR
mozillabugzillaMatch4.1.1
OR
mozillabugzillaMatch4.1.2
OR
mozillabugzillaMatch4.1.3
OR
mozillabugzillaMatch4.2
OR
mozillabugzillaMatch4.2rc1
OR
mozillabugzillaMatch4.2rc2
OR
mozillabugzillaMatch4.2.1
OR
mozillabugzillaMatch4.2.2
OR
mozillabugzillaMatch4.2.3
OR
mozillabugzillaMatch4.2.4
OR
mozillabugzillaMatch4.2.5
OR
mozillabugzillaMatch4.2.6
OR
mozillabugzillaMatch4.2.7
OR
mozillabugzillaMatch4.2.8
OR
mozillabugzillaMatch4.2.9
OR
mozillabugzillaMatch4.2.10
OR
mozillabugzillaMatch4.2.11
OR
mozillabugzillaMatch4.3
OR
mozillabugzillaMatch4.3.1
OR
mozillabugzillaMatch4.3.2
OR
mozillabugzillaMatch4.3.3
OR
mozillabugzillaMatch4.4
OR
mozillabugzillaMatch4.4rc1
OR
mozillabugzillaMatch4.4rc2
OR
mozillabugzillaMatch4.4.1
OR
mozillabugzillaMatch4.4.2
OR
mozillabugzillaMatch4.4.3
OR
mozillabugzillaMatch4.4.4
OR
mozillabugzillaMatch4.4.5
OR
mozillabugzillaMatch4.4.6
OR
mozillabugzillaMatch4.5
OR
mozillabugzillaMatch4.5.1
OR
mozillabugzillaMatch4.5.2
OR
mozillabugzillaMatch4.5.3
OR
mozillabugzillaMatch4.5.4
OR
mozillabugzillaMatch4.5.5
OR
mozillabugzillaMatch4.5.6
Node
fedoraprojectfedoraMatch20
OR
fedoraprojectfedoraMatch21
VendorProductVersionCPE
mozillabugzilla*cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*
mozillabugzilla4.1cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*
mozillabugzilla4.1.1cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*
mozillabugzilla4.1.2cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*
mozillabugzilla4.1.3cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*
mozillabugzilla4.2cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*
mozillabugzilla4.2cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*
mozillabugzilla4.2cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*
mozillabugzilla4.2.1cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*
mozillabugzilla4.2.2cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*
Rows per page:
1-10 of 411

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

AI Score

7.1

Confidence

Low

EPSS

0.003

Percentile

72.1%