Security Advisory for Bugzilla 3.0.10, 3.2.5, 3.4.4, and 3.5.2

2010-02-01 Thread mkanat
Summary

===



Bugzilla is a Web-based bug-tracking system, used by a large number of

software projects.



This advisory covers two security issues that have recently been

fixed in the Bugzilla code:



+ Some files stored on the web server are not correctly protected

  against external access and can be viewed from a web browser.



+ Restricting a bug to a group while moving the bug to another product

  has no effect if the group is not used by both products. The bug may

  become public if no other group restriction applies.



All affected installations are encouraged to upgrade as soon as

possible.





Vulnerability Details

=



Issue 1

---

Class:   Information leak

Versions:all versions before 3.0.11, 3.2.6, 3.4.5, and 3.5.3

Description: Bugzilla allows web browsers to serve the contents of

 files in the CVS/, contrib/, docs/en/xml/, and t/

 directories, as well as the old-params.txt file.

 These files do not contain sensitive data by default, but

 custom installations may have added scripts or files into

 these directories which contain e.g. passwords or some 

 other sensitive information. We now forbird access to

 these directories from a web browser as a preventive

 measure.

References:  https://bugzilla.mozilla.org/show_bug.cgi?id=314871

 https://bugzilla.mozilla.org/show_bug.cgi?id=434801

CVE Number:  CVE-2009-3989



Issue 2

---

Class:   Information leak

Versions:3.3.1 to 3.4.4, 3.5.1, 3.5.2

Description: When moving a bug from one product to another, an  

 intermediate page is displayed letting you select the 

 groups the bug should be restricted to in the new

 product. However, a regression in the 3.4.x series

 made it ignore all groups which are not available in

 both products. As a workaround, you had to move the

 bug to the new product first and then restrict it to

 the desired groups, in two distinct steps, which 

 could make the bug temporarily public.

Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=532493

CVE Number:  CVE-2009-3387





Vulnerability Solutions

===



The fixes for all of the security bugs mentioned in this advisory are

included in the 3.0.11, 3.2.6, 3.4.5, and 3.5.3 releases. Upgrading

to these releases will protect installations from possible exploits of

these issues.



Full release downloads, patches to upgrade Bugzilla from previous

versions, and CVS upgrade instructions are available at:



  http://www.bugzilla.org/download/



Specific patches for each of the individual issues can be found on the

corresponding bug reports for each issue, at the URL given in the

reference for that issue in the list above.





Credits

===



The Bugzilla team wish to thank the following people for their

assistance in locating, advising us of, and assisting us to fix these

situations:



Max Kanat-Alexander

Frédéric Buclin

Reed Loden

Joel Peshkin



General information about the Bugzilla bug-tracking system can be found

at:



  http://www.bugzilla.org/



Comments and follow-ups can be directed to the mozilla.support.bugzilla

newsgroup or the support-bugzilla mailing list.

http://www.bugzilla.org/support/ has directions for accessing these

forums.


Security Advisory for Bugzilla 3.2.1, 3.0.7, and 3.3.2

2009-02-03 Thread mkanat
-BEGIN PGP SIGNED MESSAGE-

Hash: SHA1



Summary

===



Bugzilla is a Web-based bug-tracking system, used by a large number of

software projects.



Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl,

generated insufficiently random numbers, resulting in all random

tokens being the same, all CSRF protection being defeated, and the

new attachment_base functionality being compromised. Only these

releases were affected--earlier releases are not affected.



All affected installations are encouraged to upgrade as soon as 

possible.



Vulnerability Details

=



Class:   Insufficiently Random Numbers

Versions:3.2.1, 3.0.7, and 3.3.2

Fixed In:3.2.2, 3.0.8, 3.3.3

Description: Bugzilla was calling srand() at compile time. Under

 mod_perl, this led to all Apache children having the same

 random seed, meaning that they all generated identical

 "random" strings instead of actually random strings.



 This means that all tokens were highly predictable, all

 CSRF protection was easily circumvented, and any

 installation using the new attachment_base functionality

 could possibly have any private attachment viewed without

 the user even logging in.



 Versions before 3.2.1, 3.0.7, and 3.3.2 were not

 affected. Installations that are not using mod_perl

 for Bugzilla are not affected.



References:  https://bugzilla.mozilla.org/show_bug.cgi?id=476594



Vulnerability Solutions

===



The fix for this issue in is included in the 3.3.3, 3.2.2, and 3.0.8

releases. Upgrading to a release with the relevant fix will protect

your installation from possible exploits of this issue.



Full release downloads, patches to upgrade Bugzilla from previous

versions, and CVS upgrade instructions are available at:



  http://www.bugzilla.org/download/





Credits

===



The Bugzilla team wish to thank the following people/organizations for

their assistance in locating, advising us of, and assisting us to fix

these issues:



Philippe M. Chiasson

Dave Miller

Max Kanat-Alexander



General information about the Bugzilla bug-tracking system can be found

at:



  http://www.bugzilla.org/



Comments and follow-ups can be directed to the mozilla.support.bugzilla

newsgroup or the support-bugzilla mailing list.

http://www.bugzilla.org/support/ has directions for accessing these

forums.



- --

Max Kanat-Alexander

Release Manager, Bugzilla Project

-BEGIN PGP SIGNATURE-

Version: GnuPG v2.0.9 (GNU/Linux)



iEYEARECAAYFAkmIHcoACgkQaL2D/aEJPK4heQCgr6JIKQlgRWtUL+ISeOgWzCZ9

IIEAnA2nPUknQi0QIQuhzx59gL5LGcHd

=zVkI

-END PGP SIGNATURE-



Security Advisory for Bugzilla 3.0.3, 3.1.3, 2.22.3, and 2.20.5

2008-05-06 Thread mkanat
Summary

===


Bugzilla is a Web-based bug-tracking system, used by a large number of

software projects.


This advisory covers three security issues that have recently been

fixed in the Bugzilla code:


* Users without the "canconfirm" privilege could enter a bug as NEW

  or ASSIGNED by using the XML-RPC interface.


* When viewing several bugs at once, there was a Cross-Site Scripting hole.


* The inbound email interface allowed you to set the Reporter via the

  text of the email, instead of just using the From header.


All affected installations are encouraged to upgrade as soon as possible.


Vulnerability Details

=


Class:   Unauthorized Bug Change

Versions:3.1.3

Description: Users normally need the "canconfirm" privilege to put bugs

 in the NEW or ASSIGNED state. However, users were being 

 allowed to create bugs in the NEW or ASSIGNED state if they

 were creating the bug through the XML-RPC interface.

Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=415471



Class:   Cross-Site Scripting

Versions:2.17.2 and higher

Description: When using the "Format for Printing" view of a bug (or

 the "Long Format" of a bug list, which is the same thing),

 there was a cross-site scripting hole--arbitrary text

 from a particular URL parameter could be injected into the

 page without filtering.

Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=425665



Class:   Account Impersonation (Minor)

Versions:2.23.4 and higher

Description: By design, email_in.pl always believes the "From" header as

 the user making changes or uses that as the reporter of the

 bug. However, you could also specify the changer/reporter in

 the body of the email and override the "From" header, possibly

 bypassing some security checks set up by administrators

 against the "From" header.

 For most installations this is a minor or inconsequential

 issue, as the documentation of email_in.pl already explains

 that it does not do any user authentication (it just

 believes the "From" header), so installations using it should

 not have been expecting user account security (though they

 may have had checks against the "From" header--that is what

 makes this a security issue).

Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=419188



Vulnerability Solutions

===


The fixes for the security bugs mentioned in this advisory are

included in the 3.0.4, 3.1.4, 2.22.4, and 2.20.6 releases. Upgrading

to these releases will protect installations from possible exploits of

these issues.


Full release downloads, patches to upgrade Bugzilla from previous

versions, and CVS upgrade instructions are available at:


  http://www.bugzilla.org/download/



Credits

===


The Bugzilla team wish to thank the following people for their

assistance in locating, advising us of, and assisting us to fix

these issues:


Frédéric Buclin

Max Kanat-Alexander

Bradley Baetz

Loren Butler

Marc Schumann


General information about the Bugzilla bug-tracking system can be found

at:


  http://www.bugzilla.org/


Comments and follow-ups can be directed to the mozilla.support.bugzilla

newsgroup or the support-bugzilla mailing list.

http://www.bugzilla.org/support/ has directions for accessing these

forums.


Security Advisory for Bugzilla 3.0.1 and 3.1.1

2007-09-20 Thread mkanat
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Summary
===

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers a critical security issue that has recently been
fixed in the Bugzilla code:

* Even with account creation disabled, users can use the WebService to
  create an account.

We strongly advise that 2.23.x and 3.0.x users upgrade to 3.0.2
immediately. Users of CVS HEAD or 3.1.1 should upgrade to 3.1.2
immediately. This is critical if you have a "requirelogin" installation
and also have the WebService enabled.


Vulnerability Details
=

Class:   Unauthorized Access
Versions:2.23.3 and above.
Description: Bugzilla::WebService::User::offer_account_by_email does
 not check the "createemailregexp" parameter, and thus
 allows users to create accounts who would normally be
 denied account creation.
 The "emailregexp" parameter is still checked.
 If you do not have the SOAP::Lite Perl module installed on
 your Bugzilla system, your system is not vulnerable
 (because the Bugzilla WebService will not be enabled).

Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=395632


Vulnerability Solutions
===

The fix for the security bug mentioned in this advisory is
included in the 3.0.2 and 3.1.2 releases. Upgrading to these
releases will protect installations from possible exploits of this
issue.

Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:

  http://www.bugzilla.org/download/

If you are unable to upgrade, you should IMMEDIATELY apply the
appropriate patch for your version:

2.23.x & 3.0.x: https://bugzilla.mozilla.org/attachment.cgi?id=280385
 3.1.x: https://bugzilla.mozilla.org/attachment.cgi?id=280316


Credits
===

The Bugzilla team wish to thank the following people for their
assistance in locating, advising us of, and assisting us to fix
this issue:

Sascha Jensen
Frédéric Buclin
Max Kanat-Alexander
Marc Schumann

General information about the Bugzilla bug-tracking system can be found
at:

  http://www.bugzilla.org/

Comments and follow-ups can be directed to the mozilla.support.bugzilla
newsgroup or the support-bugzilla mailing list.
http://www.bugzilla.org/support/ has directions for accessing these
forums.

- -Max Kanat-Alexander
Release Manager, Bugzilla Project
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFG8aCnaL2D/aEJPK4RAmvIAKDV/8QLPzBh3FIquCISug1SScQIQwCg568R
sDrDqfbLXfcjA/MQ+rTdPLM=
=CH0G
-END PGP SIGNATURE-


Security Advisory for Bugzilla 3.0, 2.22.1, and 2.20.4

2007-08-24 Thread mkanat
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Summary
===

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers three security issues that have recently been
fixed in the Bugzilla code:

+ A possible cross-site scripting (XSS) vulnerability when filing bugs
  using the guided form.

+ When using email_in.pl, insufficiently escaped data may be passed to
  sendmail.

+ Users using the WebService interface may access Bugzilla's
time-tracking fields even if they normally cannot see them.

We strongly advise that 2.20.x and 2.22.x users should upgrade to 2.20.5
and 2.22.3 respectively. 3.0 users, and users of 2.18.x or below, should
upgrade to 3.0.1.

Vulnerability Details
=

Issue 1
- ---
Class:   Cross-Site Scripting
Versions:2.17.1 and above
Description: Bugzilla does not properly escape the 'buildid' field in
 the guided form when filing bugs. From 2.17.1 till 2.23.3,
 this field was based exclusively on the User-Agent string
 returned by your web browser. Since 2.23.4, this parameter
 can be defined in the URL passed to enter_bug.cgi,
overwriting the User-Agent string and may lead to cross-site scripting.
 The guided form is not usually used by Bugzilla
installations, as it is shipped only as an example to be modified for
their own use.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=386942

Issue 2
- ---
Class:   Command Injection
Versions:2.23.4 and above
Description: Bugzilla 2.23.4 and newer use the Email:: modules instead
 of the Mail:: and MIME:: ones. The argument passed to the
- -f option of Email::Send::Sendmail() is insufficiently escaped
 and may lead to limited command injection when called from
 email_in.pl, a script which was also introduced in 2.23.4.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=386860

Issue 3
- ---
Class:   Information Leak
Versions:2.23.3 and above
Description: Bugzilla's WebService (XML-RPC) interface allows you to
access the time-tracking fields (such as Deadline, Estimated Time, etc.)
 on all bugs, even if you normally cannot access
time-tracking fields.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=382056


Vulnerability Solutions
===

The fixes for all of the security bugs mentioned in this advisory are
included in the 2.20.5, 2.22.3, 3.0.1 and 3.1.1 releases. Upgrading to
these releases will protect installations from possible exploits of
these issues.

Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:

  http://www.bugzilla.org/download/

Specific patches for each of the individual issues can be found on the
corresponding bug reports for each issue, at the URL given in the
reference for that issue in the list above.


Credits
===

The Bugzilla team wish to thank the following people for their
assistance in locating, advising us of, and assisting us to fix these
situations:

Frédéric Buclin
Max Kanat-Alexander
Dave Miller
Loïc Minier
Masahiro Yamada

General information about the Bugzilla bug-tracking system can be found
at:

  http://www.bugzilla.org/

Comments and follow-ups can be directed to the mozilla.support.bugzilla
newsgroup or the support-bugzilla mailing list.
http://www.bugzilla.org/support/ has directions for accessing these
forums.

- -Max Kanat-Alexander
Release Manager, Bugzilla Project
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGzfUyaL2D/aEJPK4RAg45AJ9BbvXDxCo8BDHtXmYwcQmJk2LVAgCgwlH9
DICuj3dpooF9hOx8d3yLJmE=
=vqUf
-END PGP SIGNATURE-


Security Advisory for Bugzilla 2.20.3, 2.22.1, and 2.23.3

2007-02-03 Thread mkanat
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Summary
===

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers two security issues that have recently been
fixed in the Bugzilla code:

+ A possible cross-site scripting (XSS) vulnerability in Atom feeds
  produced by Bugzilla.

+ Web server settings given by Bugzilla which provide security settings
  to protect data files from access via the web are overridden by the
  mod_perl startup script when running under mod_perl (development
  snapshot only).

We strongly advise that 2.20.x users should upgrade to 2.20.4. 2.22
users, and users of 2.16.x or below, should upgrade to 2.22.2. Versions
2.18.x are not affected by either of these vulnerabilities.

Development snapshots of 2.23 before 2.23.4 are also vulnerable to all
of these issues. If you are using a development snapshot, you should
upgrade to 2.23.4, use CVS to update, or apply the patches from the
specific bugs listed below.

Vulnerability Details
=

Issue 1
- ---
Class:   Cross-Site Scripting
Versions:2.20.1 and above
Description: Bugzilla does not properly escape some fields in generated
 Atom feeds, which leads to the potential for cross-site
 scripting in feed readers that support javascript and
 properly implement the Atom feed specification.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=367674

Issue 2
- ---
Class:   Database password disclosure
Versions:2.23.3 only
Description: Bugzilla development snapshot version 2.23.3 introduced
 the ability to run Bugzilla under mod_perl on Apache.
 The mod_perl initialization script included with Bugzilla
 defines a new  block in the Apache configuration
 for the directory containing Bugzilla. This block fails to
 include permission for .htaccess files to override file
 access permissions.  The .htaccess file shipped with
 Bugzilla prohibits access by web browsers to read the
 localconfig file, which contains the username and password
 for connecting to the database server.
 If you are not running Bugzilla under mod_perl, then this
 does not affect you.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=367071


Vulnerability Solutions
===

The fixes for all of the security bugs mentioned in this advisory are
included in the 2.20.4, 2.22.2, and 2.23.4 releases. Upgrading to these
releases will protect installations from possible exploits of these
issues.

Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:

  http://www.bugzilla.org/download/

Specific patches for each of the individual issues can be found on the
corresponding bug reports for each issue, at the URL given in the
reference for that issue in the list above.


Credits
===

The Bugzilla team wish to thank the following people for their
assistance in locating, advising us of, and assisting us to fix these
situations:

Frédéric Buclin
Dave Miller
Olav Vitters
Max Kanat-Alexander

General information about the Bugzilla bug-tracking system can be found
at:

  http://www.bugzilla.org/

Comments and follow-ups can be directed to the mozilla.support.bugzilla
newsgroup or the support-bugzilla mailing list.
http://www.bugzilla.org/support/ has directions for accessing these
forums.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFw96laL2D/aEJPK4RAnNoAJ0R0Gz0Q8B5FkVx6NeMu5ReMtyhMACeOQ+P
AOlfSHsEKMJRrL1WV6Xl+VY=
=RcCp
-END PGP SIGNATURE-


Security Advisory for Bugzilla 2.18.5, 2.20.2, 2.22, and 2.23.2

2006-10-16 Thread mkanat
Summary
===

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers six security issues that have recently been 
fixed in the Bugzilla code:

+ Sometimes the information put into the  and  tags in Bugzilla
  was not properly escaped, leading to a possible XSS vulnerability.

+ Bugzilla administrators were allowed to put raw, unfiltered HTML into
  many fields in Bugzilla, leading to a possible XSS vulnerability. 
  Now, the HTML allowed in those fields is limited.

+ attachment.cgi could leak the names of private attachments

+ The "deadline" field was visible in the XML format of a bug, even to
  users who were not a member of the "timetrackinggroup."

+ A malicious user could pass a URL to an admin, and make the admin
  delete or change something that he had not intended to delete or 
  change.

+ It is possible to inject arbitrary HTML into the showdependencygraph.cgi
  page, allowing for a cross-site scripting attack.

We strongly advise that 2.18.x users upgrade to 2.18.6. 2.20.x users
should upgrade to 2.20.3. 2.22 users, and users of 2.16.x or below,
should upgrade to 2.22.1.

Development snapshots of 2.23 before 2.23.3 are also vulnerable to all
of these issues. If you are using a development snapshot, you should
upgrade to 2.23.3, use CVS to update, or apply the patches from the 
specific bugs listed below.

Vulnerability Details
=

Issue 1
---
Class:   Cross-Site Scripting
Versions:2.15 and above
Description: Bugzilla sometimes displays admin-provided data in page 
 headers (meaning the  and  HTML tags of a page).
 Sometimes, this data was not properly escaped, leading to 
 the possibility of a Cross-Site Scripting vulnerability.
 For the most part, this was only exploitable by 
 administrators, and so is not of critical severity.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=330555

Issue 2
---
Class:   Cross-Site Scripting
Versions:2.0 and above
Description: Bugzilla allows administrators to put HTML in the
 descriptions of products, components, and other items. It
 also allows HTML in certain other fields. Before the
 most recent releases of Bugzilla, this HTML was completely
 unfiltered. These fields are only editable by
 certain users, who are specified by the admin. This makes
 this vulnerability less severe. However, these users could
 use this exploit to perform Cross-Site Scripting attacks
 on nearly all users of a particular Bugzilla (including
 users with higher permission levels than themselves).

 Bugzilla now allows only certain HTML tags in those fields,
 protecting users from a Cross-Site Scripting attack.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=206037

Issue 3
---
Class:   Information Leak
Versions:2.17 and above
Description: When viewing an attachment in "Diff" mode, a user who is
 not in the "insidergroup" (the group required to view
 private attachments) can read the one-line descriptions
 of all attachments, even "private" attachments.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=346086

Issue 4
---
Class:   Information Leak
Versions:2.19.2 and above
Description: Bugzilla has a "deadline" field, which is usually only
 visible to people in the "timetrackinggroup" group.
 However, it was exposed in the XML format of a bug to all
 users.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=346564

Issue 5
---
Class:   Security Enhancement
Versions:2.0 and above
Description: Bugzilla updates, deletes, and creates data through a
 web interface. Administrators update things like user
 accounts through this interface. All of these pages accept
 URL variables in both GET and POST formats.

 A malicious user could craft a URL that would edit a user
 (or any other admin-protected item), and then using a
 service like TinyURL, could obscure the URL so that an
 administrator couldn't tell what it was. Then, getting the
 administrator to click on that URL, the action would be
 performed, against the administrator's will.

 This is now prevented. Bugzilla will only accept changes
 on administrative pages if they come from Bugzilla's own
 forms. That is, you have to use the form to make changes--
 you now cannot just click a URL and accidentally make an
 administrative change to Bugzilla.

 Although technically this affects all versions of Bugzilla,
 it has only been fixed on our most recent release (2.22.1
 and our latest development snapshot, 2

[BUGZILLA] Security Advisory for Bugzilla 2.20, 2.21.1, and 2.18.4

2006-02-21 Thread mkanat
Summary
===

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers three security bugs that have recently been
discovered and fixed in the Bugzilla code:

+ The 'whinedays' and 'mostfreqthreshold' parameters are not correctly
  validated in editparams.cgi. The first one can lead to SQL injection.

+ Escaped HTML markup in titles of RSS feeds are incorrectly decoded by
  some RSS readers and could potentially lead to XSS vulnerabilities.

+ The login form on the home page, in conjuction with very specific
  configuation settings and a specially formed URL, may redirect you
  outside the Bugzilla installation, allowing the login name and password
  to be stolen.

All Bugzilla installations are advised to upgrade to the latest stable
version of Bugzilla, 2.20.1.

Development snapshots of 2.21 before 2.22rc1 are also vulnerable.
If you are using a development snapshot, you should upgrade to 2.22rc1,
use CVS to update, or apply the patches from the specific bugs listed below.

None of these vulnerabilities affect the old Bugzilla 2.16.x versions.

Vulnerability Details
=

Issue 1
---
Class:   SQL injection
Versions:2.17.1 and above
Description: The 'whinedays' parameter, editable from editparams.cgi,
 is not validated before being saved. This can lead to SQL
 injection in the whineatnews.pl script. This injection
 requires administrative privileges.
 The validation for the 'mostfreqthreshold' parameter is also
 missing, but this is not exploitable.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=312498


Issue 2
---
Class:   Cross Site Scripting
Versions:2.20rc1 - 2.20, 2.21.1
Description: Some RSS readers incorrectly decode escaped HTML markup in
 feed titles and this could be used to inject some scripts.
 Although this is not a Bugzilla bug, we prefer to shift to
 Atom feeds, where the RFC is unambiguous about HTML markup
 in feed titles.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=313441


Issue 3
---
Class:   Sensitive Data Exposure
Versions:2.19.3 and above
Description: When the Bugzilla login page is at a subdirectory of the web
 server and the subdirectory name is a resolvable host on the
 victim's local network, it is possible to craft a URL that,
 when used to login to Bugzilla, would send the user's
 credentials to this host.
 These conditions make this flaw very difficult to exploit.
Reference:   https://bugzilla.mozilla.org/show_bug.cgi?id=325079


Vulnerability Solutions
===

The fixes for all of the security bugs mentioned in this advisory
are included in the 2.18.5, 2.20.1, and 2.22rc1 releases. Upgrading
to these releases will protect installations from possible exploits
of these issues.

Full release downloads, patches to upgrade Bugzilla from previous
versions, and CVS upgrade instructions are available at:
  http://www.bugzilla.org/download.html

Specific patches for each of the individual issues can be found on the
corresponding bug reports for each issue, at the URL given in the
reference for that issue in the list above.


Credits
===

The Bugzilla team wish to thank the following people for their
assistance in locating, advising us of, and assisting us to fix
these situations:

Frédéric Buclin
Phil Ringnalda
Myk Melez
Teemu Mannermaa


General information about the Bugzilla bug-tracking system can be found
at http://www.bugzilla.org/

Comments and follow-ups can be directed to the
netscape.public.mozilla.webtools newsgroup or the mozilla-webtools
mailing list; http://www.bugzilla.org/support/ has directions for
accessing these forums.