Bugzilla before 2.14 does not properly escape untrusted parameters, which could allow remote attackers to conduct unauthorized activities via cross-site scripting (CSS) and possibly SQL injection attacks on (1) the product or output form variables for reports.cgi, (2) the voteon, bug_id, and user variables for showvotes.cgi, (3) an invalid email address in createaccount.cgi, (4) an invalid ID in showdependencytree.cgi, (5) invalid usernames and other fields in process_bug.cgi, and (6) error messages in buglist.cgi.
2001-09-10T04:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | mozilla | bugzilla | 2.4 | Yes |
Application | mozilla | bugzilla | 2.6 | Yes |
Application | mozilla | bugzilla | 2.8 | Yes |
Application | mozilla | bugzilla | 2.10 | Yes |
Application | mozilla | bugzilla | 2.12 | Yes |
Application | mozilla | bugzilla | 2.14 | Yes |