Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name.
References
Link | Resource |
---|---|
http://advisories.mageia.org/MGASA-2015-0048.html | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html | Third Party Advisory |
http://www.bugzilla.org/security/4.0.15/ | Patch Issue Tracking Vendor Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:030 | |
https://bugzilla.mozilla.org/show_bug.cgi?id=1079065 | Issue Tracking Vendor Advisory |
https://security.gentoo.org/glsa/201607-11 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2015-02-01 15:59
Updated : 2017-01-03 02:59
NVD link : CVE-2014-8630
Mitre link : CVE-2014-8630
CVE.ORG link : CVE-2014-8630
JSON object : View
Products Affected
mozilla
- bugzilla
fedoraproject
- fedora
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')