Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://advisories.mageia.org/MGASA-2015-0048.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html - Third Party Advisory | |
References | () http://www.bugzilla.org/security/4.0.15/ - Issue Tracking, Patch, Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2015:030 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1079065 - Issue Tracking, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201607-11 - |
Information
Published : 2015-02-01 15:59
Updated : 2024-11-21 02:19
NVD link : CVE-2014-8630
Mitre link : CVE-2014-8630
CVE.ORG link : CVE-2014-8630
JSON object : View
Products Affected
fedoraproject
- fedora
mozilla
- bugzilla
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')