First published: Tue May 16 2006(Updated: )
Bugzilla 2.20rc1 through 2.20 and 2.21.1, when using RSS 1.0, allows remote attackers to conduct cross-site scripting (XSS) attacks via a title element with HTML encoded sequences such as ">", which are automatically decoded by some RSS readers. NOTE: this issue is not in Bugzilla itself, but rather due to design or documentation inconsistencies within RSS, or implementation vulnerabilities in RSS readers. While this issue normally would not be included in CVE, it is being identified since the Bugzilla developers have addressed it.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Bugzilla | =2.20-rc2 | |
Mozilla Bugzilla | =2.20-rc1 | |
Mozilla Bugzilla | =2.20 | |
Mozilla Bugzilla | =2.21.1 | |
Mozilla Bugzilla | =2.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2420 has a moderate severity due to its potential for cross-site scripting attacks.
To mitigate CVE-2006-2420, it is recommended to upgrade to a version of Bugzilla that is not affected by this vulnerability.
CVE-2006-2420 affects Bugzilla versions 2.20rc1 through 2.20 and version 2.21.1.
CVE-2006-2420 is a cross-site scripting (XSS) vulnerability that can be exploited through improperly encoded RSS feed elements.
Remote attackers can exploit CVE-2006-2420 to conduct XSS attacks on users consuming the vulnerable RSS feeds.