Several bugs fixed in – Bugzilla

Several security advisories have been released about three fixed security issues on the Bugzilla bug-tracking system. Even systems developed for software bug tracking purposes have their own bugs. ;-)

More details about these issues is located at new Secunia’s SA18979 advisory (all issues described), BID16738 (Whinedays parameter issue) and BID16745 (user credential redirect issue). There is no separate Bugtraq ID related to RSS reader title encoding issue (this is more a XSS issue related to RSS readers than bug in Bugzilla itself). A more detailed description about SQL injection type ‘Whinedays’ issue is located at Bugzilla Bug #312498 entry. Secunia’s severity level is Moderately Critical; 3/5. It seems that this vulnerability report is the first rated as Moderately Critical after December, 2003 (Secunia’s Product database has more details if You are interested). FrSIRT rated these issues as Moderate Risk.

From the SA18979 advisory:

#1: Input passed to the “whinedays” parameter in “editparams.cgi” isn’t properly sanitised before being used in a SQL query.
What are the risks of this vulnerability?
This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
#2: The problem is that some RSS readers decodes encoded HTML in feed titles.

What are the risks of this vulnerability?
This can be exploited to inject arbitrary HTML and script code, which will be executed in a user’s RSS readers session in context of an affected site when the malicious user data is viewed.
#3: The problem is that users may send login requests to an incorrect web site when the URL contains a double slash in the path name.

And what are the risks?
Successful exploitation requires that the login page is a subdirectory of the web root and that the subdirectory is a resolvable address on the user’s network.

Original Bugzilla Security Advisory is located at Because of range of these issues all Bugzilla installations are reportedly advised to upgrade to the latest stable version 2.20.1. The Bugzilla advisory lists old Bugzilla 2.16.x versions as immune, however.

This is interesting:
Related to RSS reader encoding issue Bugzilla “prefers to shift to Atom feeds, where the RFC is unambiguous about HTML markup in feed titles”.

The reporters of these vulnerabilities live in several countries because of worldwide Bugzilla community, for example Teemu Mannermaa is from Finland. Mr. Mannermaa has discovered other Bugzilla issues earlier too, e.g. related to fixed version 2.16.11. Additionally, Myk Melez has been listed at SA17030 published in October too.
The recent Mozilla’s Bugzilla version is 2.20. Linux Kernel project uses version 2.16.10, in turn. Red Hat Bugzilla is one of the popular Bugzilla sites too. According to their Web site version 2.18-rh is in use.

Bugzilla Team didn’t only fixed security issues, the detailed Release Notes pages are located here.