Lucene search

K
openvasCopyright (C) 2011 Greenbone AGOPENVAS:1361412562310103215
HistoryAug 22, 2011 - 12:00 a.m.

Bugzilla Multiple Security Vulnerabilities

2011-08-2200:00:00
Copyright (C) 2011 Greenbone AG
plugins.openvas.org
25

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

6.3

Confidence

Low

EPSS

0.032

Percentile

91.2%

Bugzilla is prone to the following vulnerabilities:

  1. A security-bypass vulnerability.

  2. An email header-injection vulnerability.

  3. Multiple information-disclosure vulnerabilities.

  4. Multiple cross-site scripting vulnerabilities.

Successfully exploiting these issues may allow an attacker to bypass certain security restrictions, obtain
sensitive information, execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based
authentication credentials, and perform actions in the vulnerable application in the context of the victim.

# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:mozilla:bugzilla";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.103215");
  script_version("2023-07-28T05:05:23+0000");
  script_tag(name:"last_modification", value:"2023-07-28 05:05:23 +0000 (Fri, 28 Jul 2023)");
  script_tag(name:"creation_date", value:"2011-08-22 16:04:33 +0200 (Mon, 22 Aug 2011)");
  script_cve_id("CVE-2011-2379", "CVE-2011-2380", "CVE-2011-2381", "CVE-2011-2976", "CVE-2011-2977", "CVE-2011-2978",
                "CVE-2011-2979");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");

  script_name("Bugzilla Multiple Security Vulnerabilities");

  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/49042");
  script_xref(name:"URL", value:"http://www.bugzilla.org/security/3.4.11/");

  script_tag(name:"qod_type", value:"remote_banner");
  script_category(ACT_GATHER_INFO);
  script_family("Web application abuses");
  script_copyright("Copyright (C) 2011 Greenbone AG");
  script_dependencies("bugzilla_detect.nasl");
  script_mandatory_keys("bugzilla/installed");

  script_tag(name:"solution", value:"Vendor updates are available. Please see the references for more
information.");
  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"summary", value:"Bugzilla is prone to the following vulnerabilities:

1. A security-bypass vulnerability.

2. An email header-injection vulnerability.

3. Multiple information-disclosure vulnerabilities.

4. Multiple cross-site scripting vulnerabilities.

Successfully exploiting these issues may allow an attacker to bypass certain security restrictions, obtain
sensitive information, execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based
authentication credentials, and perform actions in the vulnerable application in the context of the victim.");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (!port = get_app_port(cpe: CPE))
  exit(0);

if (!vers = get_app_version(cpe: CPE, port: port))
  exit(0);

if (version_in_range(version: vers, test_version:"4.1", test_version2:"4.1.2") ||
    version_in_range(version: vers, test_version:"4.0", test_version2:"4.0.1") ||
    version_in_range(version: vers, test_version:"3.6", test_version2:"3.6.5") ||
    version_in_range(version: vers, test_version:"3.4", test_version2:"3.4.11")) {
  security_message(port:port);
  exit(0);
}

exit(0);

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

6.3

Confidence

Low

EPSS

0.032

Percentile

91.2%