Vulnerability Name:

CVE-2002-0008 (CCN-7804)

Assigned:2002-01-05
Published:2002-01-05
Updated:2008-09-10
Summary:Bugzilla before 2.14.1 allows remote attackers to (1) spoof a user comment via an HTTP request to process_bug.cgi using the "who" parameter, instead of the Bugzilla_login cookie, or (2) post a bug as another user by modifying the reporter parameter to enter_bug.cgi, which is passed to post_bug.cgi.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: BUGTRAQ
Type: UNKNOWN
20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older

Source: MISC
Type: Vendor Advisory
http://bugzilla.mozilla.org/show_bug.cgi?id=108385

Source: MISC
Type: Vendor Advisory
http://bugzilla.mozilla.org/show_bug.cgi?id=108516

Source: MITRE
Type: CNA
CVE-2002-0008

Source: CCN
Type: RHSA-2002-001
Updated bugzilla packages available

Source: REDHAT
Type: UNKNOWN
RHSA-2002:001

Source: CCN
Type: Bugzilla Web site
Bugzilla 2.14.1 Release Notes

Source: CCN
Type: Bugzilla Security Advisory Jan 5th, 2002
Bugzilla 2.14.1 Released!

Source: CONFIRM
Type: Vendor Advisory
http://www.bugzilla.org/security2_14_1.html

Source: XF
Type: UNKNOWN
bugzilla-postbug-report-spoofing(7804)

Source: XF
Type: UNKNOWN
bugzilla-processbug-comment-spoofing(7805)

Source: BID
Type: UNKNOWN
3793

Source: CCN
Type: BID-3793
BugZilla Process_Bug.CGI Comment Spoofing Vulnerability

Source: BID
Type: UNKNOWN
3794

Source: CCN
Type: BID-3794
BugZilla Post_Bug.CGI Bug Report Spoofing Vulnerability

Source: XF
Type: UNKNOWN
bugzilla-postbug-report-spoofing(7804)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mozilla:bugzilla:*:*:*:*:*:*:*:* (Version <= 2.14.1)

  • Configuration CCN 1:
  • cpe:/a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2002-0008 (CCN-7805)

    Assigned:2002-01-05
    Published:2002-01-05
    Updated:2008-09-10
    Summary:Bugzilla before 2.14.1 allows remote attackers to (1) spoof a user comment via an HTTP request to process_bug.cgi using the "who" parameter, instead of the Bugzilla_login cookie, or (2) post a bug as another user by modifying the reporter parameter to enter_bug.cgi, which is passed to post_bug.cgi.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Low
    Availibility (A): None
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Partial
    Availibility (A): None
    Vulnerability Type:CWE-Other
    Vulnerability Consequences:Bypass Security
    References:Source: MITRE
    Type: CNA
    CVE-2002-0008

    Source: CCN
    Type: RHSA-2002-001
    Updated bugzilla packages available

    Source: CCN
    Type: Bugzilla Web site
    Bugzilla 2.14.1 Release Notes

    Source: CCN
    Type: Bugzilla Security Advisory Jan 5th, 2002
    Bugzilla 2.14.1 Released!

    Source: CCN
    Type: BID-3793
    BugZilla Process_Bug.CGI Comment Spoofing Vulnerability

    Source: CCN
    Type: BID-3794
    BugZilla Post_Bug.CGI Bug Report Spoofing Vulnerability

    Source: XF
    Type: UNKNOWN
    bugzilla-processbug-comment-spoofing(7805)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    mozilla bugzilla *
    mozilla bugzilla 2.8
    mozilla bugzilla 2.10
    mozilla bugzilla 2.12
    mozilla bugzilla 2.14
    mozilla bugzilla 2.4
    mozilla bugzilla 2.6
    redhat linux powertools 7.0
    mozilla bugzilla 2.8
    mozilla bugzilla 2.10
    mozilla bugzilla 2.12
    mozilla bugzilla 2.14
    mozilla bugzilla 2.4
    mozilla bugzilla 2.6
    redhat linux powertools 7.0