Bugzilla WebService Lets Remote Users Create Accounts
SecurityTracker Alert ID: 1018719|
SecurityTracker URL: http://securitytracker.com/id/1018719
(Links to External Site)
Updated: Oct 1 2007|
Original Entry Date: Sep 20 2007
Modification of user information|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes |
Version(s): 2.23.3 and later versions|
A vulnerability was reported in Bugzilla. A remote user can create accounts on the target application.|
The 'Bugzilla::WebService::User::offer_account_by_email' function does not check the 'createemailregexp' parameter. A remote user can invoke the WebService to create an account even if account creation is disabled.
Only systems with WebService enabled are affected.
Sascha Jensen reported this vulnerability.
A remote user can create accounts on the target application.|
The vendor has issued fixed versions (3.0.2 and 3.1.2).|
The vendor has also issued the following patches.
For 2.23.x & 3.0.x:
Vendor URL: bugzilla.mozilla.org/ (Links to External Site)
Access control error|
|Underlying OS: Linux (Any), UNIX (Any)|
Source Message Contents
Subject: Security Advisory for Bugzilla 3.0.1 and 3.1.1|
-----BEGIN PGP SIGNED MESSAGE-----
Bugzilla is a Web-based bug-tracking system, used by a large number of
This advisory covers a critical security issue that has recently been
fixed in the Bugzilla code:
* Even with account creation disabled, users can use the WebService to
create an account.
We strongly advise that 2.23.x and 3.0.x users upgrade to 3.0.2
immediately. Users of CVS HEAD or 3.1.1 should upgrade to 3.1.2
immediately. This is critical if you have a "requirelogin" installation
and also have the WebService enabled.
Class: Unauthorized Access
Versions: 2.23.3 and above.
Description: Bugzilla::WebService::User::offer_account_by_email does
not check the "createemailregexp" parameter, and thus
allows users to create accounts who would normally be
denied account creation.
The "emailregexp" parameter is still checked.
If you do not have the SOAP::Lite Perl module installed on
your Bugzilla system, your system is not vulnerable
(because the Bugzilla WebService will not be enabled).
The fix for the security bug mentioned in this advisory is
included in the 3.0.2 and 3.1.2 releases. Upgrading to these
releases will protect installations from possible exploits of this
Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:
If you are unable to upgrade, you should IMMEDIATELY apply the
appropriate patch for your version:
2.23.x & 3.0.x: https://bugzilla.mozilla.org/attachment.cgi?id=280385
The Bugzilla team wish to thank the following people for their
assistance in locating, advising us of, and assisting us to fix
General information about the Bugzilla bug-tracking system can be found
Comments and follow-ups can be directed to the mozilla.support.bugzilla
newsgroup or the support-bugzilla mailing list.
http://www.bugzilla.org/support/ has directions for accessing these
- -Max Kanat-Alexander
Release Manager, Bugzilla Project
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
-----END PGP SIGNATURE-----