Lucene search

K
nvd[email protected]NVD:CVE-2013-0786
HistoryFeb 24, 2013 - 11:48 a.m.

CVE-2013-0786

2013-02-2411:48:25
CWE-200
web.nvd.nist.gov
5

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

6.5

Confidence

Low

EPSS

0.003

Percentile

68.4%

The Bugzilla::Search::build_subselect function in Bugzilla 2.x and 3.x before 3.6.13 and 3.7.x and 4.0.x before 4.0.10 generates different error messages for invalid product queries depending on whether a product exists, which allows remote attackers to discover private product names by using debug mode for a query.

Affected configurations

Nvd
Node
mozillabugzillaRange3.6.12
OR
mozillabugzillaMatch3.6
OR
mozillabugzillaMatch3.6rc1
OR
mozillabugzillaMatch3.6.0
OR
mozillabugzillaMatch3.6.1
OR
mozillabugzillaMatch3.6.2
OR
mozillabugzillaMatch3.6.3
OR
mozillabugzillaMatch3.6.4
OR
mozillabugzillaMatch3.6.5
OR
mozillabugzillaMatch3.6.6
OR
mozillabugzillaMatch3.6.7
OR
mozillabugzillaMatch3.6.8
OR
mozillabugzillaMatch3.6.9
OR
mozillabugzillaMatch3.6.10
OR
mozillabugzillaMatch3.6.11
Node
mozillabugzillaMatch3.7
OR
mozillabugzillaMatch3.7.1
OR
mozillabugzillaMatch3.7.2
OR
mozillabugzillaMatch3.7.3
Node
mozillabugzillaMatch4.0
OR
mozillabugzillaMatch4.0rc1
OR
mozillabugzillaMatch4.0rc2
OR
mozillabugzillaMatch4.0.1
OR
mozillabugzillaMatch4.0.2
OR
mozillabugzillaMatch4.0.3
OR
mozillabugzillaMatch4.0.4
OR
mozillabugzillaMatch4.0.5
OR
mozillabugzillaMatch4.0.6
OR
mozillabugzillaMatch4.0.7
OR
mozillabugzillaMatch4.0.8
OR
mozillabugzillaMatch4.0.9
Node
mozillabugzillaMatch2.0
OR
mozillabugzillaMatch2.2
OR
mozillabugzillaMatch2.4
OR
mozillabugzillaMatch2.6
OR
mozillabugzillaMatch2.8
OR
mozillabugzillaMatch2.9
OR
mozillabugzillaMatch2.10
OR
mozillabugzillaMatch2.12
OR
mozillabugzillaMatch2.14
OR
mozillabugzillaMatch2.14.1
OR
mozillabugzillaMatch2.14.2
OR
mozillabugzillaMatch2.14.3
OR
mozillabugzillaMatch2.14.4
OR
mozillabugzillaMatch2.14.5
OR
mozillabugzillaMatch2.16
OR
mozillabugzillaMatch2.16rc1
OR
mozillabugzillaMatch2.16rc2
OR
mozillabugzillaMatch2.16.1
OR
mozillabugzillaMatch2.16.2
OR
mozillabugzillaMatch2.16.3
OR
mozillabugzillaMatch2.16.4
OR
mozillabugzillaMatch2.16.5
OR
mozillabugzillaMatch2.16.6
OR
mozillabugzillaMatch2.16.7
OR
mozillabugzillaMatch2.16.8
OR
mozillabugzillaMatch2.16.9
OR
mozillabugzillaMatch2.16.10
OR
mozillabugzillaMatch2.16.11
OR
mozillabugzillaMatch2.17
OR
mozillabugzillaMatch2.17.1
OR
mozillabugzillaMatch2.17.2
OR
mozillabugzillaMatch2.17.3
OR
mozillabugzillaMatch2.17.4
OR
mozillabugzillaMatch2.17.5
OR
mozillabugzillaMatch2.17.6
OR
mozillabugzillaMatch2.17.7
OR
mozillabugzillaMatch2.18
OR
mozillabugzillaMatch2.18rc1
OR
mozillabugzillaMatch2.18rc2
OR
mozillabugzillaMatch2.18rc3
OR
mozillabugzillaMatch2.18.1
OR
mozillabugzillaMatch2.18.2
OR
mozillabugzillaMatch2.18.3
OR
mozillabugzillaMatch2.18.4
OR
mozillabugzillaMatch2.18.5
OR
mozillabugzillaMatch2.18.6
OR
mozillabugzillaMatch2.18.6\+
OR
mozillabugzillaMatch2.18.7
OR
mozillabugzillaMatch2.18.8
OR
mozillabugzillaMatch2.18.9
OR
mozillabugzillaMatch2.19
OR
mozillabugzillaMatch2.19.1
OR
mozillabugzillaMatch2.19.2
OR
mozillabugzillaMatch2.19.3
OR
mozillabugzillaMatch2.20
OR
mozillabugzillaMatch2.20rc1
OR
mozillabugzillaMatch2.20rc2
OR
mozillabugzillaMatch2.20.1
OR
mozillabugzillaMatch2.20.2
OR
mozillabugzillaMatch2.20.3
OR
mozillabugzillaMatch2.20.4
OR
mozillabugzillaMatch2.20.5
OR
mozillabugzillaMatch2.20.6
OR
mozillabugzillaMatch2.20.7
OR
mozillabugzillaMatch2.21
OR
mozillabugzillaMatch2.21.1
OR
mozillabugzillaMatch2.21.2
OR
mozillabugzillaMatch2.21.2rc1
OR
mozillabugzillaMatch2.22
OR
mozillabugzillaMatch2.22rc1
OR
mozillabugzillaMatch2.22.1
OR
mozillabugzillaMatch2.22.2
OR
mozillabugzillaMatch2.22.3
OR
mozillabugzillaMatch2.22.4
OR
mozillabugzillaMatch2.22.5
OR
mozillabugzillaMatch2.22.6
OR
mozillabugzillaMatch2.22.7
OR
mozillabugzillaMatch2.23
OR
mozillabugzillaMatch2.23.1
OR
mozillabugzillaMatch2.23.2
OR
mozillabugzillaMatch2.23.3
OR
mozillabugzillaMatch2.23.4
VendorProductVersionCPE
mozillabugzilla*cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*
mozillabugzilla3.6cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*
mozillabugzilla3.6cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*
mozillabugzilla3.6.0cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*
mozillabugzilla3.6.1cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*
mozillabugzilla3.6.2cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*
mozillabugzilla3.6.3cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*
mozillabugzilla3.6.4cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*
mozillabugzilla3.6.5cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*
mozillabugzilla3.6.6cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*
Rows per page:
1-10 of 1131

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

6.5

Confidence

Low

EPSS

0.003

Percentile

68.4%