CVE-2014-8630

Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2.11:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.4.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.4.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.4.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.5.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.5.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.5.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.5.6:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*

History

21 Nov 2024, 02:19

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2015-0048.html - () http://advisories.mageia.org/MGASA-2015-0048.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html - Third Party Advisory
References () http://www.bugzilla.org/security/4.0.15/ - Patch, Issue Tracking, Vendor Advisory () http://www.bugzilla.org/security/4.0.15/ - Issue Tracking, Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:030 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:030 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1079065 - Issue Tracking, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=1079065 - Issue Tracking, Vendor Advisory
References () https://security.gentoo.org/glsa/201607-11 - () https://security.gentoo.org/glsa/201607-11 -

Information

Published : 2015-02-01 15:59

Updated : 2024-11-21 02:19


NVD link : CVE-2014-8630

Mitre link : CVE-2014-8630

CVE.ORG link : CVE-2014-8630


JSON object : View

Products Affected

fedoraproject

  • fedora

mozilla

  • bugzilla
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')