Lucene search

K
nvd[email protected]NVD:CVE-2012-0465
HistoryApr 27, 2012 - 8:55 p.m.

CVE-2012-0465

2012-04-2720:55:01
CWE-264
web.nvd.nist.gov

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

6.6 Medium

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

75.3%

Bugzilla 3.5.x and 3.6.x before 3.6.9, 3.7.x and 4.0.x before 4.0.6, and 4.1.x and 4.2.x before 4.2.1, when the inbound_proxies option is enabled, does not properly validate the X-Forwarded-For HTTP header, which allows remote attackers to bypass the lockout policy via a series of authentication requests with (1) different IP address strings in this header or (2) a long string in this header.

Affected configurations

NVD
Node
mozillabugzillaMatch3.5.1
OR
mozillabugzillaMatch3.5.2
OR
mozillabugzillaMatch3.5.3
OR
mozillabugzillaMatch3.6.0
OR
mozillabugzillaMatch3.6.1
OR
mozillabugzillaMatch3.6.2
OR
mozillabugzillaMatch3.6.3
OR
mozillabugzillaMatch3.6.4
OR
mozillabugzillaMatch3.6.5
OR
mozillabugzillaMatch3.6.6
OR
mozillabugzillaMatch3.6.7
OR
mozillabugzillaMatch3.6.8
OR
mozillabugzillaMatch3.7.1
OR
mozillabugzillaMatch3.7.2
OR
mozillabugzillaMatch3.7.3
OR
mozillabugzillaMatch4.0.1
OR
mozillabugzillaMatch4.0.2
OR
mozillabugzillaMatch4.0.3
OR
mozillabugzillaMatch4.0.4
OR
mozillabugzillaMatch4.0.5
OR
mozillabugzillaMatch4.1.1
OR
mozillabugzillaMatch4.1.2
OR
mozillabugzillaMatch4.1.3
OR
mozillabugzillaMatch4.2
OR
mozillabugzillaMatch4.2rc1
OR
mozillabugzillaMatch4.2rc2

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

6.6 Medium

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

75.3%