|
Message-ID: <AANLkTimX8QzLAY4UYJ24xG7bhqnCEP0tV_2Ldv8-kq7T@mail.gmail.com> Date: Tue, 6 Jul 2010 00:51:40 -0600 From: Kurt Seifried <kurt@...fried.org> To: oss-security@...ts.openwall.com Subject: Bugzilla 3.7.1 CVE request CVE # for this please. http://www.bugzilla.org/security/3.7.1/ Summary ======= Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issue has been discovered in Bugzilla: * In the 3.7.1 development snapshot, adding bugs using email_in.pl or the WebServices Bug.create method would not restrict bugs to Mandatory or Default groups. All affected installations are encouraged to upgrade as soon as possible. Vulnerability Details ===================== Class: Unauthorized Access to Confidential Information Affects: 3.7, 3.7.1 Fixed In: 3.7.2 Description: Bugzilla administrators can set certain groups as being "mandatory" for when a new bug is filed. (That is, bugs are always restricted to access by those groups.) Administrators can also set some groups as "Default", meaning that if the user makes no selection about groups, the new bug will be restricted to the groups set as Default. In the unreleased 3.7 code and 3.7.1 development snapshot, restricting a bug to mandatory or default groups would not happen when the bug was newly created using the inbound email interface (email_in.pl) or the "Bug.create" method in the WebServices interface. This means that these bugs could be publicly available, when they should have been restricted to being accessible only to certain groups. References: https://bugzilla.mozilla.org/show_bug.cgi?id=574892 -- Kurt Seifried kurt@...fried.org tel: 1-703-879-3176
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.