Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name.
References
Link | Resource |
---|---|
http://www.bugzilla.org/security/4.0.15/ | Patch Issue Tracking Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1079065 | Issue Tracking Vendor Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html | Third Party Advisory |
https://security.gentoo.org/glsa/201607-11 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:030 | |
http://advisories.mageia.org/MGASA-2015-0048.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2015-02-01 07:59
Updated : 2017-01-02 18:59
NVD link : CVE-2014-8630
Mitre link : CVE-2014-8630
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
mozilla
- bugzilla
fedoraproject
- fedora