Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name.
References
Link | Resource |
---|---|
http://advisories.mageia.org/MGASA-2015-0048.html | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html | Third Party Advisory |
http://www.bugzilla.org/security/4.0.15/ | Patch Issue Tracking Vendor Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:030 | |
https://bugzilla.mozilla.org/show_bug.cgi?id=1079065 | Issue Tracking Vendor Advisory |
https://security.gentoo.org/glsa/201607-11 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mozilla
Published: 2015-02-01T15:00:00
Updated: 2016-12-30T16:57:01
Reserved: 2014-11-06T00:00:00
Link: CVE-2014-8630
JSON object: View
NVD Information
Status : Modified
Published: 2015-02-01T15:59:04.353
Modified: 2017-01-03T02:59:20.563
Link: CVE-2014-8630
JSON object: View
Redhat Information
No data.
CWE