CVE-2003-0013
CVSS7.5
发布时间 :2003-01-17 00:00:00
修订时间 :2016-10-17 22:28:18
NMCOS    

[原文]The default .htaccess scripts for Bugzilla 2.14.x before 2.14.5, 2.16.x before 2.16.2, and 2.17.x before 2.17.3 do not include filenames for backup copies of the localconfig file that are made from editors such as vi and Emacs, which could allow remote attackers to obtain a database password by directly accessing the backup file.


[CNNVD]Bugzilla LocalConfig配置文件远程泄露漏洞(CNNVD-200301-018)

        
        Bugzilla是一款基于WEB的漏洞跟踪收集系统,使用了Perl和MySQL数据库,可运行在多种Unix和Linux操作系统下。
        Bugzilla中默认.htaccess脚本没有正确防止用户对localconfig备份文件的访问,远程攻击者可以利用这个漏洞获得敏感信息,包括数据库密码。
        由checksetup.pl提供的.htaccess脚本,没有正确防止远程攻击者对localconfig备份文件的访问,如果用户使用了vi或者emacs编辑localconfig文件后,会建立.swp或者~suffix文件,这些文件可以直接被任何用户访问下载,并可能获得Bugzilla使用的数据库密码信息。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:mozilla:bugzilla:2.14.3Mozilla Bugzilla 2.14.3
cpe:/a:mozilla:bugzilla:2.16.1Mozilla Bugzilla 2.16.1
cpe:/a:mozilla:bugzilla:2.14.4Mozilla Bugzilla 2.14.4
cpe:/a:mozilla:bugzilla:2.17.1Mozilla Bugzilla 2.17.1
cpe:/a:mozilla:bugzilla:2.16Mozilla Bugzilla 2.16
cpe:/a:mozilla:bugzilla:2.14.1Mozilla Bugzilla 2.14.1
cpe:/a:mozilla:bugzilla:2.14.2Mozilla Bugzilla 2.14.2
cpe:/a:mozilla:bugzilla:2.17Mozilla Bugzilla 2.17
cpe:/a:mozilla:bugzilla:2.14Mozilla Bugzilla 2.14

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0013
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0013
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200301-018
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=104154319200399&w=2
(UNKNOWN)  BUGTRAQ  20030102 [BUGZILLA] Security Advisory - remote database password disclosure
http://www.debian.org/security/2003/dsa-230
(VENDOR_ADVISORY)  DEBIAN  DSA-230
http://www.iss.net/security_center/static/10970.php
(UNKNOWN)  XF  bugzilla-htaccess-database-password(10970)
http://www.securityfocus.com/bid/6501
(UNKNOWN)  BID  6501

- 漏洞信息

Bugzilla LocalConfig配置文件远程泄露漏洞
高危 配置错误
2003-01-17 00:00:00 2005-05-13 00:00:00
远程  
        
        Bugzilla是一款基于WEB的漏洞跟踪收集系统,使用了Perl和MySQL数据库,可运行在多种Unix和Linux操作系统下。
        Bugzilla中默认.htaccess脚本没有正确防止用户对localconfig备份文件的访问,远程攻击者可以利用这个漏洞获得敏感信息,包括数据库密码。
        由checksetup.pl提供的.htaccess脚本,没有正确防止远程攻击者对localconfig备份文件的访问,如果用户使用了vi或者emacs编辑localconfig文件后,会建立.swp或者~suffix文件,这些文件可以直接被任何用户访问下载,并可能获得Bugzilla使用的数据库密码信息。
        

- 公告与补丁

        厂商补丁:
        Mozilla
        -------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Mozilla Bugzilla 2.14:
        Bugzilla Upgrade Bugzilla 2.14.5
        
        http://www.bugzilla.org/download.html

        Mozilla Bugzilla 2.14.1:
        Bugzilla Upgrade Bugzilla 2.14.5
        
        http://www.bugzilla.org/download.html

        Mozilla Bugzilla 2.14.2:
        Bugzilla Upgrade Bugzilla 2.14.5
        
        http://www.bugzilla.org/download.html

        Mozilla Bugzilla 2.14.3:
        Bugzilla Upgrade Bugzilla 2.14.5
        
        http://www.bugzilla.org/download.html

        Mozilla Bugzilla 2.14.4:
        Bugzilla Upgrade Bugzilla 2.14.5
        
        http://www.bugzilla.org/download.html

        Bugzilla Patch bugzilla-2.14.4-to-2.14.5.diff.gz
        
        http://ftp.mozilla.org/pub/webtools/bugzilla-2.14.4-to-2.14.5.diff.gz

        Mozilla Bugzilla 2.16:
        Bugzilla Upgrade Bugzilla 2.16.2
        
        http://www.bugzilla.org/download.html

        Mozilla Bugzilla 2.16.1:
        Bugzilla Upgrade Bugzilla 2.16.2
        
        http://www.bugzilla.org/download.html

        Bugzilla Patch bugzilla-2.16.1-to-2.16.2.diff.gz
        
        http://ftp.mozilla.org/pub/webtools/bugzilla-2.16.1-to-2.16.2.diff.gz

        Mozilla Bugzilla 2.17:
        Bugzilla Upgrade Bugzilla 2.17.3
        
        http://www.bugzilla.org/download.html

        Mozilla Bugzilla 2.17.1:
        Bugzilla Upgrade Bugzilla 2.17.3
        
        http://www.bugzilla.org/download.html

- 漏洞信息

6351
Bugzilla .htaccess Backup File Protection Failure
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

Bugzilla contains a flaw that may lead to an unauthorized information disclosure. The default .htaccess scripts fail to properly prevent access to backups of the lcoalconfig file created by a text editor (typically with a .swp or ~ suffix). It is possible for a remote attacker to download a backup copy of the localconfig file and obtain a user's database password, resulting in a loss of confidentiality.

- 时间线

2002-12-21 Unknow
2002-12-21 Unknow

- 解决方案

Upgrade to version 2.16.2 (stable release) or 2.17.3 (development release) or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Bugzilla LocalConfig Backup File Disclosure Vulnerability
Configuration Error 6501
Yes No
2003-01-02 12:00:00 2009-07-11 07:17:00
This issue was announced by the vendor.

- 受影响的程序版本

Mozilla Bugzilla 2.17.1
Mozilla Bugzilla 2.17
Mozilla Bugzilla 2.16.1
Mozilla Bugzilla 2.16
- Mandriva Linux Mandrake 9.0
- Mandriva Linux Mandrake 9.0
Mozilla Bugzilla 2.14.4
Mozilla Bugzilla 2.14.3
Mozilla Bugzilla 2.14.2
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Debian Linux 3.0
+ Debian Linux 3.0
+ Debian Linux 3.0
+ Debian Linux 3.0
Mozilla Bugzilla 2.14.1
Mozilla Bugzilla 2.14
- RedHat Linux 7.1
- RedHat Linux 7.1
- RedHat Linux 7.0
- RedHat Linux 7.0
- RedHat Linux 7.0
- RedHat Linux 7.0
- RedHat Linux 7.0
Mozilla Bugzilla 2.17.3
Mozilla Bugzilla 2.16.2
+ Conectiva Linux 9.0
+ Conectiva Linux 9.0
Mozilla Bugzilla 2.14.5

- 不受影响的程序版本

Mozilla Bugzilla 2.17.3
Mozilla Bugzilla 2.16.2
+ Conectiva Linux 9.0
+ Conectiva Linux 9.0
Mozilla Bugzilla 2.14.5

- 漏洞讨论

Bugzilla is prone to a vulnerability that may result in backups of the localconfig file being disclosed to remote attackers.

The .htaccess files provided with the checksetup.pl script do not adequately protect backups of the localconfig file that may be created by text editors. As a result, it is possible for a remote user to request and gain unauthorized access to these backup files.

- 漏洞利用

This issue may be exploited with a web browser.

- 解决方案

Debian has released a security advisory (DSA 230-1) containing fixes. Users are advised to upgrade as soon as possible.

The vendor has addressed this issue in Bugzilla 2.14.5, 2.16.2 and 2.17.3. Patches for 2.14.4 and 2.16.1 have also been made available.


Mozilla Bugzilla 2.14

Mozilla Bugzilla 2.14.1

Mozilla Bugzilla 2.14.2

Mozilla Bugzilla 2.14.3

Mozilla Bugzilla 2.14.4

Mozilla Bugzilla 2.16

Mozilla Bugzilla 2.16.1

Mozilla Bugzilla 2.17

Mozilla Bugzilla 2.17.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站