Bugzilla 2.10 allows remote attackers to execute arbitrary commands via shell metacharacters in a username that is then processed by (1) the Bugzilla_login cookie in post_bug.cgi, or (2) the who parameter in process_bug.cgi.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bugzilla | Mozilla | 2.4 (including) | 2.4 (including) |
Bugzilla | Mozilla | 2.6 (including) | 2.6 (including) |
Bugzilla | Mozilla | 2.8 (including) | 2.8 (including) |
Bugzilla | Mozilla | 2.10 (including) | 2.10 (including) |