[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-1546Date: (C)2014-08-15   (M)2023-12-22


The response function in the JSONP endpoint in WebService/Server/JSONRPC.pm in jsonrpc.cgi in Bugzilla 3.x and 4.x before 4.0.14, 4.1.x and 4.2.x before 4.2.10, 4.3.x and 4.4.x before 4.4.5, and 4.5.x before 4.5.5 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with the _bz_callback character set.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
SECTRACK-1030648
http://www.securityfocus.com/archive/1/532895
FEDORA-2014-8919
FEDORA-2014-8920
MDVSA-2014:169
http://advisories.mageia.org/MGASA-2014-0349.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1036213

CPE    124
cpe:/a:mozilla:bugzilla:3.7
cpe:/a:mozilla:bugzilla:4.2:rc1
cpe:/a:mozilla:bugzilla:4.2:rc2
cpe:/a:mozilla:bugzilla:3.4
...
CWE    1
CWE-352
OVAL    5
oval:org.secpod.oval:def:107306
oval:org.secpod.oval:def:108425
oval:org.secpod.oval:def:107842
oval:org.secpod.oval:def:107843
...

© SecPod Technologies