Mozilla Bugzilla up to 4.2 X-Forwarded-For Header access control

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.7 | $0-$5k | 0.00 |
Summary
A vulnerability marked as critical has been reported in Mozilla Bugzilla. The affected element is an unknown function of the component X-Forwarded-For Header Handler. This manipulation causes access control. This vulnerability is registered as CVE-2012-0465. Furthermore, an exploit is available. It is suggested to upgrade the affected component.
Details
A vulnerability classified as critical was found in Mozilla Bugzilla (Bug Tracking Software). Affected by this vulnerability is an unknown code of the component X-Forwarded-For Header Handler. The manipulation with an unknown input leads to a access control vulnerability. The CWE definition for the vulnerability is CWE-264. As an impact it is known to affect confidentiality. The summary by CVE is:
Bugzilla 3.5.x and 3.6.x before 3.6.9, 3.7.x and 4.0.x before 4.0.6, and 4.1.x and 4.2.x before 4.2.1, when the inbound_proxies option is enabled, does not properly validate the X-Forwarded-For HTTP header, which allows remote attackers to bypass the lockout policy via a series of authentication requests with (1) different IP address strings in this header or (2) a long string in this header.
The weakness was published 02/18/2012 by Soroush Dalili as Bug 728639 as not defined bug report (Bugzilla). It is possible to read the advisory at bugzilla.mozilla.org. This vulnerability is known as CVE-2012-0465 since 01/09/2012. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Technical details are unknown but a public exploit is available. The attack technique deployed by this issue is T1068 according to MITRE ATT&CK.
A public exploit has been developed by Soroush Dalili and been published immediately after the advisory. It is possible to download the exploit at bugzilla.mozilla.org. It is declared as proof-of-concept. We expect the 0-day to have been worth approximately $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 58828 (FreeBSD : bugzilla -- multiple vulnerabilities (09c87973-8b9d-11e1-b393-20cf30e32f6d)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family FreeBSD Local Security Checks and running in the context l.
Upgrading to version 3.6.9, 4.0.6 or 4.2.1 eliminates this vulnerability. A possible mitigation has been published 3 months after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (75058), Tenable (58828), SecurityFocus (BID 53153†), OSVDB (81262†) and Secunia (SA48835†). Additional details are provided at packetstormsecurity.org. Similar entry is available at VDB-5276. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
- 3.5.1
- 3.5.2
- 3.5.3
- 3.6.0
- 3.6.1
- 3.6.2
- 3.6.3
- 3.6.4
- 3.6.5
- 3.6.6
- 3.6.7
- 3.6.8
- 3.7.1
- 3.7.2
- 3.7.3
- 4.0.1
- 4.0.2
- 4.0.3
- 4.0.4
- 4.0.5
- 4.1.1
- 4.1.2
- 4.1.3
- 4.2
License
Website
- Vendor: https://www.mozilla.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 6.7
VulDB Base Score: 7.5
VulDB Temp Score: 6.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Author: Soroush Dalili
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 58828
Nessus Name: FreeBSD : bugzilla -- multiple vulnerabilities (09c87973-8b9d-11e1-b393-20cf30e32f6d)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Nessus Port: 🔍
OpenVAS ID: 71274
OpenVAS Name: FreeBSD Ports: bugzilla
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Exploit Delay Time: 🔍
Upgrade: Bugzilla 3.6.9/4.0.6/4.2.1
Timeline
01/09/2012 🔍02/18/2012 🔍
02/18/2012 🔍
04/18/2012 🔍
04/18/2012 🔍
04/19/2012 🔍
04/22/2012 🔍
04/23/2012 🔍
04/23/2012 🔍
04/27/2012 🔍
04/27/2012 🔍
08/05/2012 🔍
03/24/2021 🔍
Sources
Vendor: mozilla.orgAdvisory: Bug 728639
Researcher: Soroush Dalili
Status: Not defined
Confirmation: 🔍
CVE: CVE-2012-0465 (🔍)
GCVE (CVE): GCVE-0-2012-0465
GCVE (VulDB): GCVE-100-5275
X-Force: 75058
SecurityFocus: 53153 - Bugzilla Cross Site Request Forgery and Security Bypass Vulnerabilities
Secunia: 48835 - Bugzilla Cross-Site Request Forgery Vulnerability, Less Critical
OSVDB: 81262
Vulnerability Center: 35794 - Bugzilla Improper Validation of the X-Forwarded-For HTTP Header Allows Remote Lockout Policy Bypass, Low
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
See also: 🔍
Entry
Created: 04/23/2012 16:27Updated: 03/24/2021 06:39
Changes: 04/23/2012 16:27 (83), 04/15/2017 16:13 (9), 03/24/2021 06:39 (3)
Complete: 🔍
Cache ID: 216:F33:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.