Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks
Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1
Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.
Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to XSS.CVE-2011-3657
The User.offer_account_by_email WebService method ignores the user_can_create_account setting of the authentication method and generates an email with a token in it which the user can use to create an account. Depending on the authentication method being active, this could allow the user to log in using this account. Installations where the createemailregexp parameter is empty are not vulnerable to this issue.CVE-2011-3667
The creation of bug reports and of attachments is not protected by a token and so they can be created without the consent of a user if the relevant code is embedded in an HTML page and the user visits this page. This behavior was intentional to let third-party applications submit new bug reports and attachments easily. But as this behavior can be abused by a malicious user, it has been decided to block submissions with no valid token starting from version 4.2rc1. Older branches are not patched to not break these third-party applications after the upgrade.CVE-2011-3669
A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Bugzilla software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
The vendor has issued a fix (3.4.13, 3.6.7, 4.0.3, 4.2rc1).The fixes for these issues are included in the 3.4.13, 3.6.7, 4.0.3, and 4.2rc1 releases. Upgrading to a release with the relevant fixes will protect your installation from possible exploits of these issues.Bugzilla Released