Bugzilla editparams.cgi whinedays Variable SQL Injection

2006-02-21T00:00:00
ID OSVDB:23378
Type osvdb
Reporter Teemu Mannermaa(), Phil Ringnalda(), Frédéric Buclin(), Myk Melez()
Modified 2006-02-21T00:00:00

Description

Vulnerability Description

Bugzilla contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'editparams.cgi' script not properly sanitizing user-supplied input to the 'whinedays' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

An attacker must supply valid administrative authentication credentials in order to exploit this vulnerability.

Solution Description

Upgrade to version 2.20.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Bugzilla contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'editparams.cgi' script not properly sanitizing user-supplied input to the 'whinedays' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

References:

Vendor URL: http://www.bugzilla.org/ Vendor Specific News/Changelog Entry: https://bugzilla.mozilla.org/show_bug.cgi?id=312498 Secunia Advisory ID:18979 Related OSVDB ID: 23379 Related OSVDB ID: 23380 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-02/0349.html FrSIRT Advisory: ADV-2006-0692 CVE-2006-0913 Bugtraq ID: 16738