Lucene search

K
archlinuxArch LinuxASA-201510-4
HistoryOct 08, 2015 - 12:00 a.m.

bugzilla: unauthorized account creation

2015-10-0800:00:00
Arch Linux
lists.archlinux.org
22

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.024 Low

EPSS

Percentile

88.8%

Login names (usually an email address) longer than 127 characters are
silently truncated in MySQL which could cause the domain name of the
email address to be corrupted. An attacker could use this vulnerability
to create an account with an email address different from the one
originally requested. The login name could then be automatically added
to groups based on the group’s regular expression setting.
This vulnerability has been demonstrated by truncation of an
@mozilla.com.example.com address to an @mozilla.com address that
resulted in an unauthorized account creation with the default privileges
of the mozilla group.

OSVersionArchitecturePackageVersionFilename
anyanyanybugzilla< 5.0.1-1UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.024 Low

EPSS

Percentile

88.8%