ArchLinux: 201510-4: bugzilla: unauthorized account creation
Summary
Login names (usually an email address) longer than 127 characters are silently truncated in MySQL which could cause the domain name of the email address to be corrupted. An attacker could use this vulnerability to create an account with an email address different from the one originally requested. The login name could then be automatically added to groups based on the group's regular expression setting. This vulnerability has been demonstrated by truncation of an @mozilla.com. address to an @mozilla.com address that resulted in an unauthorized account creation with the default privileges of the mozilla group.
Resolution
Upgrade to 5.0.1-1.
# pacman -Syu "bugzilla>=5.0.1-1"
The problem has been fixed upstream in version 5.0.1.
References
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4499 https://www.bugzilla.org/security/4.2.14/ https://bugzilla.mozilla.org/show_bug.cgi?id=1202447 https://bugs.archlinux.org/task/46573
Workaround
None.