SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Generic)  >   Bugzilla Vendors:   Mozilla.org
Bugzilla WebService Lets Remote Users Create Accounts
SecurityTracker Alert ID:  1018719
SecurityTracker URL:  http://securitytracker.com/id/1018719
CVE Reference:   CVE-2007-5038   (Links to External Site)
Updated:  Oct 1 2007
Original Entry Date:  Sep 20 2007
Impact:   Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2.23.3 and later versions
Description:   A vulnerability was reported in Bugzilla. A remote user can create accounts on the target application.

The 'Bugzilla::WebService::User::offer_account_by_email' function does not check the 'createemailregexp' parameter. A remote user can invoke the WebService to create an account even if account creation is disabled.

Only systems with WebService enabled are affected.

Sascha Jensen reported this vulnerability.

Impact:   A remote user can create accounts on the target application.
Solution:   The vendor has issued fixed versions (3.0.2 and 3.1.2).

The vendor has also issued the following patches.

For 2.23.x & 3.0.x:

https://bugzilla.mozilla.org/attachment.cgi?id=280385

For 3.1.x:

https://bugzilla.mozilla.org/attachment.cgi?id=280316

Vendor URL:  bugzilla.mozilla.org/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents

Subject:  Security Advisory for Bugzilla 3.0.1 and 3.1.1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Summary
=======

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers a critical security issue that has recently been
fixed in the Bugzilla code:

* Even with account creation disabled, users can use the WebService to
  create an account.

We strongly advise that 2.23.x and 3.0.x users upgrade to 3.0.2
immediately. Users of CVS HEAD or 3.1.1 should upgrade to 3.1.2
immediately. This is critical if you have a "requirelogin" installation
and also have the WebService enabled.


Vulnerability Details
=====================

Class:       Unauthorized Access
Versions:    2.23.3 and above.
Description: Bugzilla::WebService::User::offer_account_by_email does
             not check the "createemailregexp" parameter, and thus
             allows users to create accounts who would normally be
             denied account creation.
             The "emailregexp" parameter is still checked.
             If you do not have the SOAP::Lite Perl module installed on
             your Bugzilla system, your system is not vulnerable
             (because the Bugzilla WebService will not be enabled).

Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=395632


Vulnerability Solutions
=======================

The fix for the security bug mentioned in this advisory is
included in the 3.0.2 and 3.1.2 releases. Upgrading to these
releases will protect installations from possible exploits of this
issue.

Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:

  http://www.bugzilla.org/download/

If you are unable to upgrade, you should IMMEDIATELY apply the
appropriate patch for your version:

2.23.x & 3.0.x: https://bugzilla.mozilla.org/attachment.cgi?id=280385
         3.1.x: https://bugzilla.mozilla.org/attachment.cgi?id=280316


Credits
=======

The Bugzilla team wish to thank the following people for their
assistance in locating, advising us of, and assisting us to fix
this issue:

Sascha Jensen
Max Kanat-Alexander
Marc Schumann

General information about the Bugzilla bug-tracking system can be found
at:

  http://www.bugzilla.org/

Comments and follow-ups can be directed to the mozilla.support.bugzilla
newsgroup or the support-bugzilla mailing list.
http://www.bugzilla.org/support/ has directions for accessing these
forums.

- -Max Kanat-Alexander
Release Manager, Bugzilla Project
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFG8aCnaL2D/aEJPK4RAmvIAKDV/8QLPzBh3FIquCISug1SScQIQwCg568R
sDrDqfbLXfcjA/MQ+rTdPLM=
=CH0G
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC