The response function in the JSONP endpoint in WebService/Server/JSONRPC.pm in jsonrpc.cgi in Bugzilla 3.x and 4.x before 4.0.14, 4.1.x and 4.2.x before 4.2.10, 4.3.x and 4.4.x before 4.4.5, and 4.5.x before 4.5.5 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with the _bz_callback character set.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://advisories.mageia.org/MGASA-2014-0349.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136217.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136369.html - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2014:169 - | |
References | () http://www.securityfocus.com/archive/1/532895 - | |
References | () http://www.securitytracker.com/id/1030648 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1036213 - Vendor Advisory |
Information
Published : 2014-08-14 11:15
Updated : 2024-11-21 02:04
NVD link : CVE-2014-1546
Mitre link : CVE-2014-1546
CVE.ORG link : CVE-2014-1546
JSON object : View
Products Affected
mozilla
- bugzilla
CWE
CWE-352
Cross-Site Request Forgery (CSRF)