Bugzilla 2.10 allows remote attackers to execute arbitrary commands via shell metacharacters in a username that is then processed by (1) the Bugzilla_login cookie in post_bug.cgi, or (2) the who parameter in process_bug.cgi.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.atstake.com/research/advisories/2001/a043001-1.txt - Patch, Vendor Advisory | |
References | () http://www.mozilla.org/projects/bugzilla/security2_12.html - | |
References | () http://www.securityfocus.com/bid/1199 - |
Information
Published : 2001-06-27 04:00
Updated : 2024-11-20 23:35
NVD link : CVE-2001-0329
Mitre link : CVE-2001-0329
CVE.ORG link : CVE-2001-0329
JSON object : View
Products Affected
mozilla
- bugzilla
CWE