FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

bugzilla -- multiple vulnerabilities

Affected packages
3.6.0 <= bugzilla < 3.6.12
4.0.0 <= bugzilla < 4.0.9
4.2.0 <= bugzilla < 4.2.4

Details

VuXML ID 2b841f88-2e8d-11e2-ad21-20cf30e32f6d
Discovery 2012-11-13
Entry 2012-11-14
Modified 2012-11-27

A Bugzilla Security Advisory reports:

The following security issues have been discovered in Bugzilla:

Information Leak

If the visibility of a custom field is controlled by a product or a component of a product you cannot see, their names are disclosed in the JavaScript code generated for this custom field despite they should remain confidential.

Calling the User.get method with a 'groups' argument leaks the existence of the groups depending on whether an error is thrown or not. This method now also throws an error if the user calling this method does not belong to these groups (independently of whether the groups exist or not).

Trying to mark an attachment in a bug you cannot see as obsolete discloses its description in the error message. The description of the attachment is now removed from the error message.

Cross-Site Scripting

Due to incorrectly filtered field values in tabular reports, it is possible to inject code leading to XSS.

A vulnerability in swfstore.swf from YUI2 allows JavaScript injection exploits to be created against domains that host this affected YUI .swf file.

References

CVE Name CVE-2012-4189
CVE Name CVE-2012-4197
CVE Name CVE-2012-4198
CVE Name CVE-2012-4199
CVE Name CVE-2012-5881
CVE Name CVE-2012-5882
CVE Name CVE-2012-5883
URL http://yuilibrary.com/support/20121030-vulnerability/
URL https://bugzilla.mozilla.org/show_bug.cgi?id=731178
URL https://bugzilla.mozilla.org/show_bug.cgi?id=781850
URL https://bugzilla.mozilla.org/show_bug.cgi?id=790296
URL https://bugzilla.mozilla.org/show_bug.cgi?id=802204
URL https://bugzilla.mozilla.org/show_bug.cgi?id=808845