CVE-2001-0329

Bugzilla 2.10 allows remote attackers to execute arbitrary commands via shell metacharacters in a username that is then processed by (1) the Bugzilla_login cookie in post_bug.cgi, or (2) the who parameter in process_bug.cgi.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*

History

20 Nov 2024, 23:35

Type Values Removed Values Added
References () http://www.atstake.com/research/advisories/2001/a043001-1.txt - Patch, Vendor Advisory () http://www.atstake.com/research/advisories/2001/a043001-1.txt - Patch, Vendor Advisory
References () http://www.mozilla.org/projects/bugzilla/security2_12.html - () http://www.mozilla.org/projects/bugzilla/security2_12.html -
References () http://www.securityfocus.com/bid/1199 - () http://www.securityfocus.com/bid/1199 -

Information

Published : 2001-06-27 04:00

Updated : 2024-11-20 23:35


NVD link : CVE-2001-0329

Mitre link : CVE-2001-0329

CVE.ORG link : CVE-2001-0329


JSON object : View

Products Affected

mozilla

  • bugzilla