Bugzilla Input Validation Flaw in Atom Feeds Permits Cross-Site Scripting Attacks and Access Control Bug May Disclose Database Password
SecurityTracker Alert ID: 1017585|
SecurityTracker URL: http://securitytracker.com/id/1017585
(Links to External Site)
Updated: May 19 2008|
Original Entry Date: Feb 5 2007
Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 2.20.3, 2.22.1, 2.23.3|
A vulnerability was reported in Bugzilla. A remote user can conduct cross-site scripting attacks. A remote user can view the database password.|
Bugzilla does not properly filter HTML code from user-supplied input before displaying the input when generating Atom feeds. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Bugzilla software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Version 2.20.1 and above are affected.
The mod_perl initialization script included with Bugzilla overrides web server file access permissions. As a result, a remote user may be able to view the 'localconfig' file that contains the database username and password.
Only version 2.23.3 is affected. Only systems running Bugzilla under mod_perl are affected.
Versions 2.18.x are not affected by either of these vulnerabilities.
A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Bugzilla software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.|
A remote user can view the database password.
The vendor has issued fixed versions (2.20.4, 2.22.2, and 2.23.4), available at:|
The Bugzilla advisory is available at:
Vendor URL: www.bugzilla.org/security/2.20.3/ (Links to External Site)
Access control error, Input validation error|
|Underlying OS: Linux (Any), UNIX (Any), Windows (Any)|
Source Message Contents
Subject: Security Advisory for Bugzilla 2.20.3, 2.22.1, and 2.23.3|
-----BEGIN PGP SIGNED MESSAGE-----
Bugzilla is a Web-based bug-tracking system, used by a large number of
This advisory covers two security issues that have recently been
fixed in the Bugzilla code:
+ A possible cross-site scripting (XSS) vulnerability in Atom feeds
produced by Bugzilla.
+ Web server settings given by Bugzilla which provide security settings
to protect data files from access via the web are overridden by the
mod_perl startup script when running under mod_perl (development
We strongly advise that 2.20.x users should upgrade to 2.20.4. 2.22
users, and users of 2.16.x or below, should upgrade to 2.22.2. Versions
2.18.x are not affected by either of these vulnerabilities.
Development snapshots of 2.23 before 2.23.4 are also vulnerable to all
of these issues. If you are using a development snapshot, you should
upgrade to 2.23.4, use CVS to update, or apply the patches from the
specific bugs listed below.
Class: Cross-Site Scripting
Versions: 2.20.1 and above
Description: Bugzilla does not properly escape some fields in generated
Atom feeds, which leads to the potential for cross-site
properly implement the Atom feed specification.
Class: Database password disclosure
Versions: 2.23.3 only
Description: Bugzilla development snapshot version 2.23.3 introduced
the ability to run Bugzilla under mod_perl on Apache.
The mod_perl initialization script included with Bugzilla
defines a new <Directory> block in the Apache configuration
for the directory containing Bugzilla. This block fails to
include permission for .htaccess files to override file
access permissions. The .htaccess file shipped with
Bugzilla prohibits access by web browsers to read the
localconfig file, which contains the username and password
for connecting to the database server.
If you are not running Bugzilla under mod_perl, then this
does not affect you.
The fixes for all of the security bugs mentioned in this advisory are
included in the 2.20.4, 2.22.2, and 2.23.4 releases. Upgrading to these
releases will protect installations from possible exploits of these
Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:
Specific patches for each of the individual issues can be found on the
corresponding bug reports for each issue, at the URL given in the
reference for that issue in the list above.
The Bugzilla team wish to thank the following people for their
assistance in locating, advising us of, and assisting us to fix these
General information about the Bugzilla bug-tracking system can be found
Comments and follow-ups can be directed to the mozilla.support.bugzilla
newsgroup or the support-bugzilla mailing list.
http://www.bugzilla.org/support/ has directions for accessing these
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
-----END PGP SIGNATURE-----