Vulnerability CVE-2014-1546


Published: 2014-08-14

Description:
The response function in the JSONP endpoint in WebService/Server/JSONRPC.pm in jsonrpc.cgi in Bugzilla 3.x and 4.x before 4.0.14, 4.1.x and 4.2.x before 4.2.10, 4.3.x and 4.4.x before 4.4.5, and 4.5.x before 4.5.5 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with the _bz_callback character set.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Bugzilla 3.x / 4.x Cross Site Request Forgery
Mario Gomes, Byr...
27.07.2014

Type:

CWE-352

(Cross-Site Request Forgery (CSRF))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Mozilla -> Bugzilla 

 References:
http://advisories.mageia.org/MGASA-2014-0349.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136217.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136369.html
http://www.mandriva.com/security/advisories?name=MDVSA-2014:169
http://www.securityfocus.com/archive/1/532895
http://www.securitytracker.com/id/1030648
https://bugzilla.mozilla.org/show_bug.cgi?id=1036213

Copyright 2024, cxsecurity.com

 

Back to Top