Bugzilla before 3.2.10, 3.4.x before 3.4.10, 3.6.x before 3.6.4, and 4.0.x before 4.0rc2 creates a clickable link for a (1) javascript: or (2) data: URI in the URL (aka bug_file_loc) field, which allows remote attackers to conduct cross-site scripting (XSS) attacks against logged-out users via a crafted URI.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/45982 | vdb entry |
http://secunia.com/advisories/43165 | third party advisory |
http://www.bugzilla.org/security/3.2.9/ | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html | vendor advisory |
http://www.vupen.com/english/advisories/2011/0271 | vdb entry |
http://secunia.com/advisories/43033 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2011/0207 | vdb entry vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html | vendor advisory |
http://osvdb.org/70704 | vdb entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=628034 | |
http://www.debian.org/security/2011/dsa-2322 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65005 | vdb entry |