First published: Sun Feb 01 2015(Updated: )
Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Bugzilla | <=4.0.16 | |
Mozilla Bugzilla | =4.1 | |
Mozilla Bugzilla | =4.1.1 | |
Mozilla Bugzilla | =4.1.2 | |
Mozilla Bugzilla | =4.1.3 | |
Mozilla Bugzilla | =4.2 | |
Mozilla Bugzilla | =4.2-rc1 | |
Mozilla Bugzilla | =4.2-rc2 | |
Mozilla Bugzilla | =4.2.1 | |
Mozilla Bugzilla | =4.2.2 | |
Mozilla Bugzilla | =4.2.3 | |
Mozilla Bugzilla | =4.2.4 | |
Mozilla Bugzilla | =4.2.5 | |
Mozilla Bugzilla | =4.2.6 | |
Mozilla Bugzilla | =4.2.7 | |
Mozilla Bugzilla | =4.2.8 | |
Mozilla Bugzilla | =4.2.9 | |
Mozilla Bugzilla | =4.2.10 | |
Mozilla Bugzilla | =4.2.11 | |
Mozilla Bugzilla | =4.3 | |
Mozilla Bugzilla | =4.3.1 | |
Mozilla Bugzilla | =4.3.2 | |
Mozilla Bugzilla | =4.3.3 | |
Mozilla Bugzilla | =4.4 | |
Mozilla Bugzilla | =4.4-rc1 | |
Mozilla Bugzilla | =4.4-rc2 | |
Mozilla Bugzilla | =4.4.1 | |
Mozilla Bugzilla | =4.4.2 | |
Mozilla Bugzilla | =4.4.3 | |
Mozilla Bugzilla | =4.4.4 | |
Mozilla Bugzilla | =4.4.5 | |
Mozilla Bugzilla | =4.4.6 | |
Mozilla Bugzilla | =4.5 | |
Mozilla Bugzilla | =4.5.1 | |
Mozilla Bugzilla | =4.5.2 | |
Mozilla Bugzilla | =4.5.3 | |
Mozilla Bugzilla | =4.5.4 | |
Mozilla Bugzilla | =4.5.5 | |
Mozilla Bugzilla | =4.5.6 | |
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.