Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the boolean chart query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bugzilla | Mozilla | * | 2.14.1 (including) |
Red Hat Powertools 7.0 | RedHat | * | |
Red Hat Powertools 7.1 | RedHat | * |