Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080513140632.147eeef0@redhat.com>
Date: Tue, 13 May 2008 14:06:32 +0200
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com
Cc: hanno@...eck.de, "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: Re: CVE request: Bugzilla (Unauthorized Bug
 Change, XSS, Account Impersonation)

On Tue, 13 May 2008 13:07:11 +0200 Hanno Böck <hanno@...eck.de> wrote:

> > The WebService in Bugzilla before 3.1.3 allows remote authenticated
> > users without canconfirm privileges to create NEW or ASSIGNED bug
> > entries via a request to the XML-RPC interface, which bypasses the
> > canconfirm check.
> 
> I think this should be "3.1.3 and before" ?
> As 3.1.3 is also affected according to the upstream advisory.

Probably "in Bugzilla 3.1.3":

https://bugzilla.mozilla.org/show_bug.cgi?id=415471#c5

  Frédéric Buclin   2008-05-04 14:58:19 PDT
  This regression was introduced by bug 402791 in Bugzilla 3.1.3.

?

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.