CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
91.2%
Bugzilla is prone to the following vulnerabilities:
A security-bypass vulnerability.
An email header-injection vulnerability.
Multiple information-disclosure vulnerabilities.
Multiple cross-site scripting vulnerabilities.
Successfully exploiting these issues may allow an attacker to bypass certain security restrictions, obtain
sensitive information, execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based
authentication credentials, and perform actions in the vulnerable application in the context of the victim.
# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:mozilla:bugzilla";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.103215");
script_version("2023-07-28T05:05:23+0000");
script_tag(name:"last_modification", value:"2023-07-28 05:05:23 +0000 (Fri, 28 Jul 2023)");
script_tag(name:"creation_date", value:"2011-08-22 16:04:33 +0200 (Mon, 22 Aug 2011)");
script_cve_id("CVE-2011-2379", "CVE-2011-2380", "CVE-2011-2381", "CVE-2011-2976", "CVE-2011-2977", "CVE-2011-2978",
"CVE-2011-2979");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_name("Bugzilla Multiple Security Vulnerabilities");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/49042");
script_xref(name:"URL", value:"http://www.bugzilla.org/security/3.4.11/");
script_tag(name:"qod_type", value:"remote_banner");
script_category(ACT_GATHER_INFO);
script_family("Web application abuses");
script_copyright("Copyright (C) 2011 Greenbone AG");
script_dependencies("bugzilla_detect.nasl");
script_mandatory_keys("bugzilla/installed");
script_tag(name:"solution", value:"Vendor updates are available. Please see the references for more
information.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"summary", value:"Bugzilla is prone to the following vulnerabilities:
1. A security-bypass vulnerability.
2. An email header-injection vulnerability.
3. Multiple information-disclosure vulnerabilities.
4. Multiple cross-site scripting vulnerabilities.
Successfully exploiting these issues may allow an attacker to bypass certain security restrictions, obtain
sensitive information, execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based
authentication credentials, and perform actions in the vulnerable application in the context of the victim.");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if (!port = get_app_port(cpe: CPE))
exit(0);
if (!vers = get_app_version(cpe: CPE, port: port))
exit(0);
if (version_in_range(version: vers, test_version:"4.1", test_version2:"4.1.2") ||
version_in_range(version: vers, test_version:"4.0", test_version2:"4.0.1") ||
version_in_range(version: vers, test_version:"3.6", test_version2:"3.6.5") ||
version_in_range(version: vers, test_version:"3.4", test_version2:"3.4.11")) {
security_message(port:port);
exit(0);
}
exit(0);