Directory traversal vulnerability in importxml.pl in Bugzilla before 2.22.5, and 3.x before 3.0.5, when --attach_path is enabled, allows remote attackers to read arbitrary files via an XML file with a .. (dot dot) in the data element.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/31444 - Vendor Advisory | |
References | () http://secunia.com/advisories/34361 - | |
References | () http://www.bugzilla.org/security/2.22.4/ - | |
References | () http://www.securityfocus.com/bid/30661 - Exploit, Patch | |
References | () http://www.securitytracker.com/id?1020668 - | |
References | () http://www.vupen.com/english/advisories/2008/2344 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=437169 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44407 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00664.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00687.html - |
Information
Published : 2008-10-03 22:22
Updated : 2024-11-21 00:51
NVD link : CVE-2008-4437
Mitre link : CVE-2008-4437
CVE.ORG link : CVE-2008-4437
JSON object : View
Products Affected
mozilla
- bugzilla
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')