2.17.5 Security AdvisorySunday, Nov 9th, 2003
Summary ======= Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issue has been discovered in Bugzilla: * This advisory covers a security bug which was accidentally introduced in development version 2.17.5 and subsequently fixed in the Bugzilla code involving unprivileged access to restricted data. All affected installations are encouraged to upgrade as soon as possible. Vulnerability Details ===================== Class: Information leak Versions: 2.17.5 is the only version affected. Description: A new feature was introduced in version 2.17.5 which allows remote websites to build tooltips and other dynamically generated data using current bug information retrieved from Bugzilla. A security lapse in the initial implementation of this feature allows the remote site to obtain that information from Bugzilla using the privileges of the client user. References: https://bugzilla.mozilla.org/show_bug.cgi?id=195530 Vulnerability Solutions ======================= The fix for this issue is included in the releases. Upgrading to a release with the relevant fix will protect your installation from possible exploits of this issue. If you are unable to upgrade but would like to patch just the security vulnerability, there are patches available for the issue at the "References" URL. Full release downloads, patches to upgrade Bugzilla from previous versions, and git upgrade instructions are available at: https://www.bugzilla.org/download/ Credits ======= The Bugzilla team wish to thank the following people for their assistance in locating, advising us of, and assisting us to fix this issue: Reporter: Jesse Ruderman Fixed by: Gervase Markham General information about the Bugzilla bug-tracking system can be found at: https://www.bugzilla.org/ Comments and follow-ups can be directed to the mozilla.support.bugzilla newsgroup or the support-bugzilla mailing list. https://www.bugzilla.org/support/ has directions for accessing these forums.