From dkl at mozilla.com Tue Dec 22 22:08:31 2015 From: dkl at mozilla.com (David Lawrence) Date: Tue, 22 Dec 2015 17:08:31 -0500 Subject: Security advisory for Bugzilla 5.0.1, 4.4.10, and 4.2.15 Message-ID: <5679C9DF.6040109@mozilla.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Summary ======= Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issues have been discovered in Bugzilla: * Unfiltered HTML injected into a dependency graph could be used to create a cross-site scripting attack. * Some web browsers incorrectly parse CSV files as valid JavaScript code which could lead to data leak. All affected installations are encouraged to upgrade as soon as possible. Vulnerability Details ===================== Class: Cross-Site Scripting Versions: Bugzilla 2.6 to 4.2.15, 4.3.1 to 4.4.10, 4.5.1 to 5.0.1 Fixed In: 4.2.16, 4.4.11, 5.0.2 Description: During the generation of a dependency graph, the code for the HTML image map is generated locally if a local dot installation is used. With escaped HTML characters in a bug summary, it is possible to inject unfiltered HTML code in the map file which the CreateImagemap function generates. This could be used for a cross-site scripting attack. References: https://bugzilla.mozilla.org/show_bug.cgi?id=1221518 CVE Number: CVE-2015-8508 Class: Information Leak Versions: Bugzilla 2.17.1 to 4.2.15, 4.3.1 to 4.4.10, 4.5.1 to 5.0.1 Fixed In: 4.2.16, 4.4.11, 5.0.2 Description: If an external HTML page contains a