Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Bugzilla Vendors:
Bugzilla WebService Lets Remote Users Create Accounts
SecurityTracker Alert ID:  1018719
SecurityTracker URL:
CVE Reference:   CVE-2007-5038   (Links to External Site)
Updated:  Oct 1 2007
Original Entry Date:  Sep 20 2007
Impact:   Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2.23.3 and later versions
Description:   A vulnerability was reported in Bugzilla. A remote user can create accounts on the target application.

The 'Bugzilla::WebService::User::offer_account_by_email' function does not check the 'createemailregexp' parameter. A remote user can invoke the WebService to create an account even if account creation is disabled.

Only systems with WebService enabled are affected.

Sascha Jensen reported this vulnerability.

Impact:   A remote user can create accounts on the target application.
Solution:   The vendor has issued fixed versions (3.0.2 and 3.1.2).

The vendor has also issued the following patches.

For 2.23.x & 3.0.x:

For 3.1.x:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.

 Source Message Contents

Subject:  Security Advisory for Bugzilla 3.0.1 and 3.1.1

Hash: SHA1


Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers a critical security issue that has recently been
fixed in the Bugzilla code:

* Even with account creation disabled, users can use the WebService to
  create an account.

We strongly advise that 2.23.x and 3.0.x users upgrade to 3.0.2
immediately. Users of CVS HEAD or 3.1.1 should upgrade to 3.1.2
immediately. This is critical if you have a "requirelogin" installation
and also have the WebService enabled.

Vulnerability Details

Class:       Unauthorized Access
Versions:    2.23.3 and above.
Description: Bugzilla::WebService::User::offer_account_by_email does
             not check the "createemailregexp" parameter, and thus
             allows users to create accounts who would normally be
             denied account creation.
             The "emailregexp" parameter is still checked.
             If you do not have the SOAP::Lite Perl module installed on
             your Bugzilla system, your system is not vulnerable
             (because the Bugzilla WebService will not be enabled).


Vulnerability Solutions

The fix for the security bug mentioned in this advisory is
included in the 3.0.2 and 3.1.2 releases. Upgrading to these
releases will protect installations from possible exploits of this

Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:

If you are unable to upgrade, you should IMMEDIATELY apply the
appropriate patch for your version:

2.23.x & 3.0.x:


The Bugzilla team wish to thank the following people for their
assistance in locating, advising us of, and assisting us to fix
this issue:

Sascha Jensen
Max Kanat-Alexander
Marc Schumann

General information about the Bugzilla bug-tracking system can be found

Comments and follow-ups can be directed to the
newsgroup or the support-bugzilla mailing list. has directions for accessing these

- -Max Kanat-Alexander
Release Manager, Bugzilla Project
Version: GnuPG v1.4.7 (GNU/Linux)



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC