Bugzilla before 2.14 does not properly escape untrusted parameters, which could allow remote attackers to conduct unauthorized activities via cross-site scripting (CSS) and possibly SQL injection attacks on (1) the product or output form variables for reports.cgi, (2) the voteon, bug_id, and user variables for showvotes.cgi, (3) an invalid email address in createaccount.cgi, (4) an invalid ID in showdependencytree.cgi, (5) invalid usernames and other fields in process_bug.cgi, and (6) error messages in buglist.cgi.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugzilla.mozilla.org/show_bug.cgi?id=38854 - | |
References | () http://bugzilla.mozilla.org/show_bug.cgi?id=38855 - | |
References | () http://bugzilla.mozilla.org/show_bug.cgi?id=38859 - | |
References | () http://bugzilla.mozilla.org/show_bug.cgi?id=39536 - | |
References | () http://bugzilla.mozilla.org/show_bug.cgi?id=87701 - | |
References | () http://bugzilla.mozilla.org/show_bug.cgi?id=95235 - | |
References | () http://marc.info/?l=bugtraq&m=99912899900567 - | |
References | () http://www.redhat.com/support/errata/RHSA-2001-107.html - Patch, Vendor Advisory |
Information
Published : 2001-09-10 04:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1402
Mitre link : CVE-2001-1402
CVE.ORG link : CVE-2001-1402
JSON object : View
Products Affected
mozilla
- bugzilla
CWE