Vulnerability Name:

CVE-2013-1743

Assigned:2013-02-13
Published:2013-10-24
Updated:2013-10-24
Summary:Multiple cross-site scripting (XSS) vulnerabilities in report.cgi in Bugzilla 4.1.x and 4.2.x before 4.2.7 and 4.3.x and 4.4.x before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via a field value that is not properly handled during construction of a tabular report, as demonstrated by the (1) summary or (2) real name field. NOTE: this issue exists because of an incomplete fix for CVE-2012-4189.
CVSS v3 Severity:3.7 Low (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
References:Source: CONFIRM
Type: VENDOR_ADVISORY
http://www.bugzilla.org/security/4.0.10/

Source: CONFIRM
Type: VENDOR_ADVISORY
https://bugzilla.mozilla.org/show_bug.cgi?id=924932

Source: XF
Type: UNKNOWN
bugzilla-cve20131743-xss(88128)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:4.4:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    BACK
    mozilla bugzilla 4.1
    mozilla bugzilla 4.1.1
    mozilla bugzilla 4.1.2
    mozilla bugzilla 4.1.3
    mozilla bugzilla 4.3
    mozilla bugzilla 4.3.1
    mozilla bugzilla 4.3.2
    mozilla bugzilla 4.3.3
    mozilla bugzilla 4.2.5
    mozilla bugzilla 4.2.4
    mozilla bugzilla 4.2.3
    mozilla bugzilla 4.2.2
    mozilla bugzilla 4.2.1
    mozilla bugzilla 4.2 rc2
    mozilla bugzilla 4.2 rc1
    mozilla bugzilla 4.2
    mozilla bugzilla 4.4 rc1
    mozilla bugzilla 4.4 rc2
    mozilla bugzilla 4.4