Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name MDVSA-2013:285 First vendor Publication 2013-11-26
Vendor Mandriva Last vendor Modification 2013-11-26
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple vulnerabilities was found and corrected in bugzilla:

Cross-site request forgery (CSRF) vulnerability in process_bug.cgi in Bugzilla 4.4.x before 4.4.1 allows remote attackers to hijack the authentication of arbitrary users for requests that modify bugs via vectors involving a midair-collision token (CVE-2013-1733).

Cross-site request forgery (CSRF) vulnerability in attachment.cgi in Bugzilla 2.x, 3.x, and 4.0.x before 4.0.11; 4.1.x and 4.2.x before 4.2.7; and 4.3.x and 4.4.x before 4.4.1 allows remote attackers to hijack the authentication of arbitrary users for requests that commit an attachment change via an update action (CVE-2013-1734).

Multiple cross-site scripting (XSS) vulnerabilities in editflagtypes.cgi in Bugzilla 2.x, 3.x, and 4.0.x before 4.0.11; 4.1.x and 4.2.x before 4.2.7; and 4.3.x and 4.4.x before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) id or (2) sortkey parameter (CVE-2013-1742).

Multiple cross-site scripting (XSS) vulnerabilities in report.cgi in Bugzilla 4.1.x and 4.2.x before 4.2.7 and 4.3.x and 4.4.x before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via a field value that is not properly handled during construction of a tabular report, as demonstrated by the (1) summary or (2) real name field. NOTE: this issue exists because of an incomplete fix for CVE-2012-4189 (CVE-2013-1743).

The updated packages have been upgraded to the 4.2.7 version which is not affected by these issues.

Original Source

Url : http://www.mandriva.com/security/advisories?name=MDVSA-2013:285

CWE : Common Weakness Enumeration

% Id Name
60 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
40 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 190

OpenVAS Exploits

Date Description
2012-11-26 Name : FreeBSD Ports: bugzilla
File : nvt/freebsd_bugzilla20.nasl

Nessus® Vulnerability Scanner

Date Description
2013-11-27 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-285.nasl - Type : ACT_GATHER_INFO
2013-11-11 Name : The remote Fedora host is missing a security update.
File : fedora_2013-19402.nasl - Type : ACT_GATHER_INFO
2013-10-31 Name : The remote web server contains a web application that suffers from multiple v...
File : bugzilla_4_4_1.nasl - Type : ACT_GATHER_INFO
2013-10-29 Name : The remote Fedora host is missing a security update.
File : fedora_2013-19458.nasl - Type : ACT_GATHER_INFO
2013-10-29 Name : The remote Fedora host is missing a security update.
File : fedora_2013-19480.nasl - Type : ACT_GATHER_INFO
2013-10-18 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_e135f0c9375f11e380b720cf30e32f6d.nasl - Type : ACT_GATHER_INFO
2013-04-20 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-066.nasl - Type : ACT_GATHER_INFO
2012-11-20 Name : The remote web server contains a CGI application that suffers from multiple v...
File : bugzilla_3_6_12.nasl - Type : ACT_GATHER_INFO
2012-11-19 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_2b841f882e8d11e2ad2120cf30e32f6d.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 11:44:10
  • Multiple Updates
2013-11-26 17:21:18
  • First insertion