Vulnerabilities > CVE-2001-0329 - Unspecified vulnerability in Mozilla Bugzilla
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Bugzilla 2.10 allows remote attackers to execute arbitrary commands via shell metacharacters in a username that is then processed by (1) the Bugzilla_login cookie in post_bug.cgi, or (2) the who parameter in process_bug.cgi.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Exploit-Db
description | Mozilla Bugzilla 2.4/2.6/2.8/2.10 Remote Arbitrary Command Execution. CVE-2001-0329. Remote exploit for cgi platform |
id | EDB-ID:19909 |
last seen | 2016-02-02 |
modified | 2000-05-11 |
published | 2000-05-11 |
reporter | Frank van Vliet karin |
source | https://www.exploit-db.com/download/19909/ |
title | Mozilla Bugzilla 2.4/2.6/2.8/2.10 - Remote Arbitrary Command Execution |
Nessus
NASL family | CGI abuses |
NASL id | BUGZILLA_REMOTE_EXEC.NASL |
description | The remote Bugzilla bug tracking system, according to its version number, is vulnerable to arbitrary command execution flaws due to a lack of sanitization of user-supplied data in process_bug.cgi. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15565 |
published | 2004-10-25 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15565 |
title | Bugzilla Multiple Remote Command Execution |
code |
|
References
- http://www.atstake.com/research/advisories/2001/a043001-1.txt
- http://www.atstake.com/research/advisories/2001/a043001-1.txt
- http://www.mozilla.org/projects/bugzilla/security2_12.html
- http://www.mozilla.org/projects/bugzilla/security2_12.html
- http://www.securityfocus.com/bid/1199
- http://www.securityfocus.com/bid/1199