Vulnerabilities > CVE-2001-0329 - Remote Arbitrary Command Execution vulnerability in Bugzilla
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Bugzilla 2.10 allows remote attackers to execute arbitrary commands via shell metacharacters in a username that is then processed by (1) the Bugzilla_login cookie in post_bug.cgi, or (2) the who parameter in process_bug.cgi.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Exploit-Db
description | Mozilla Bugzilla 2.4/2.6/2.8/2.10 Remote Arbitrary Command Execution. CVE-2001-0329. Remote exploit for cgi platform |
id | EDB-ID:19909 |
last seen | 2016-02-02 |
modified | 2000-05-11 |
published | 2000-05-11 |
reporter | Frank van Vliet karin |
source | https://www.exploit-db.com/download/19909/ |
title | Mozilla Bugzilla 2.4/2.6/2.8/2.10 - Remote Arbitrary Command Execution |
Nessus
NASL family | CGI abuses |
NASL id | BUGZILLA_REMOTE_EXEC.NASL |
description | The remote Bugzilla bug tracking system, according to its version number, is vulnerable to arbitrary command execution flaws due to a lack of sanitization of user-supplied data in process_bug.cgi. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15565 |
published | 2004-10-25 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15565 |
title | Bugzilla Multiple Remote Command Execution |
code |
|