[arch-security] [ASA-201510-4] bugzilla: unauthorized account creation
Arch Linux Security Advisory ASA-201510-4 ========================================= Severity: High Date : 2015-10-08 CVE-ID : CVE-2015-4499 Package : bugzilla Type : unauthorized account creation Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package bugzilla before version 5.0.1-1 is vulnerable to unauthorized account creation. Resolution ========== Upgrade to 5.0.1-1. # pacman -Syu "bugzilla>=5.0.1-1" The problem has been fixed upstream in version 5.0.1. Workaround ========== None. Description =========== Login names (usually an email address) longer than 127 characters are silently truncated in MySQL which could cause the domain name of the email address to be corrupted. An attacker could use this vulnerability to create an account with an email address different from the one originally requested. The login name could then be automatically added to groups based on the group's regular expression setting. This vulnerability has been demonstrated by truncation of an @mozilla.com.example.com address to an @mozilla.com address that resulted in an unauthorized account creation with the default privileges of the mozilla group. Impact ====== A remote attacker is able to obtain default privileges for an arbitrary domain name by placing that name in a substring of an address resulting in unauthorized account creation. References ========== https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4499 https://www.bugzilla.org/security/4.2.14/ https://bugzilla.mozilla.org/show_bug.cgi?id=1202447 https://bugs.archlinux.org/task/46573
participants (1)
-
Levente Polyak