CVE-2008-2105

Severity

35%

Complexity

68%

Confidentiality

48%

email_in.pl in Bugzilla 2.23.4, 3.0.x before 3.0.4, and 3.1.x before 3.1.4 allows remote authenticated users to more easily spoof the changer of a bug via a @reporter command in the body of an e-mail message, which overrides the e-mail address as normally obtained from the From e-mail header. NOTE: since From headers are easily spoofed, this only crosses privilege boundaries in environments that provide additional verification of e-mail addresses.

email_in.pl in Bugzilla 2.23.4, 3.0.x before 3.0.4, and 3.1.x before 3.1.4 allows remote authenticated users to more easily spoof the changer of a bug via a @reporter command in the body of an e-mail message, which overrides the e-mail address as normally obtained from the From e-mail header. NOTE: since From headers are easily spoofed, this only crosses privilege boundaries in environments that provide additional verification of e-mail addresses.

CVSS 2.0 Base Score 3.5. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N).

Overview

Type

Mozilla Bugzilla

First reported 16 years ago

2008-05-07 20:20:00

Last updated 7 years ago

2017-08-08 01:30:00

Affected Software

Mozilla Bugzilla 2.4

2.4

Mozilla Bugzilla 2.6

2.6

Mozilla Bugzilla 2.8

2.8

Mozilla Bugzilla 2.10

2.10

Mozilla Bugzilla 2.12

2.12

Mozilla Bugzilla 2.14

2.14

Mozilla Bugzilla 2.14.1

2.14.1

Mozilla Bugzilla 2.14.2

2.14.2

Mozilla Bugzilla 2.14.3

2.14.3

Mozilla Bugzilla 2.14.4

2.14.4

Mozilla Bugzilla 2.14.5

2.14.5

Mozilla Bugzilla 2.16 rc1

2.16

Mozilla Bugzilla 2.16.1

2.16.1

Mozilla Bugzilla 2.16.2

2.16.2

Mozilla Bugzilla 2.16.3

2.16.3

Mozilla Bugzilla 2.16.4

2.16.4

Mozilla Bugzilla 2.16.5

2.16.5

Mozilla Bugzilla 2.16.6

2.16.6

Mozilla Bugzilla 2.16.7

2.16.7

Mozilla Bugzilla 2.16.8

2.16.8

Mozilla Bugzilla 2.16.9

2.16.9

Mozilla Bugzilla 2.16.10

2.16.10

Mozilla Bugzilla 2.16.11

2.16.11

Mozilla Bugzilla 2.17.1

2.17.1

Mozilla Bugzilla 2.17.2

2.17.2

Mozilla Bugzilla 2.17.3

2.17.3

Mozilla Bugzilla 2.17.4

2.17.4

Mozilla Bugzilla 2.17.5

2.17.5

Mozilla Bugzilla 2.17.6

2.17.6

Mozilla Bugzilla 2.17.7

2.17.7

Mozilla Bugzilla 2.18 rc1

2.18

Mozilla Bugzilla 2.18 rc2

2.18

Mozilla Bugzilla 2.18 rc3

2.18

Mozilla Bugzilla 2.18.1

2.18.1

Mozilla Bugzilla 2.18.2

2.18.2

Mozilla Bugzilla 2.18.3

2.18.3

Mozilla Bugzilla 2.18.4

2.18.4

Mozilla Bugzilla 2.18.5

2.18.5

Mozilla Bugzilla 2.18.6

2.18.6

Mozilla Bugzilla 2.19.1

2.19.1

Mozilla Bugzilla 2.19.2

2.19.2

Mozilla Bugzilla 2.19.3

2.19.3

Mozilla Bugzilla 2.20 rc1

2.20

Mozilla Bugzilla 2.20 rc2

2.20

Mozilla Bugzilla 2.20.1

2.20.1

Mozilla Bugzilla 2.20.2

2.20.2

Mozilla Bugzilla 2.20.3

2.20.3

Mozilla Bugzilla 2.20.4

2.20.4

Mozilla Bugzilla 2.20.5

2.20.5

Mozilla Bugzilla 2.20.6

2.20.6

Mozilla Bugzilla 2.21.1

2.21.1

Mozilla Bugzilla 2.21.2

2.21.2

Mozilla Bugzilla 2.22

2.22

Mozilla Bugzilla 2.22 Release Candidate 1

2.22

Mozilla Bugzilla 2.22.1

2.22.1

Mozilla Bugzilla 2.22.2

2.22.2

Mozilla Bugzilla 2.22.3

2.22.3

Mozilla Bugzilla 2.22.4

2.22.4

Mozilla Bugzilla 2.23

2.23

Mozilla Bugzilla 2.23.1

2.23.1

Mozilla Bugzilla 2.23.2

2.23.2

Mozilla Bugzilla 2.23.3

2.23.3

Mozilla Bugzilla 2.23.4

2.23.4

Mozilla Bugzilla 3.0.0

3.0.0

Mozilla Bugzilla 3.0.1

3.0.1

Mozilla Bugzilla 3.0.2

3.0.2

Mozilla Bugzilla 3.1.0

3.1.0

Mozilla Bugzilla 3.1.1

3.1.1

Mozilla Bugzilla 3.1.2

3.1.2

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.