Arch Linux Security Advisory ASA-201510-4
========================================
Severity: High
Date    : 2015-10-08
CVE-ID  : CVE-2015-4499
Package : bugzilla
Type    : unauthorized account creation
Remote  : Yes
Link    : https://wiki.archlinux.org/title/CVE

Summary
======
The package bugzilla before version 5.0.1-1 is vulnerable to
unauthorized account creation.

Resolution
=========
Upgrade to 5.0.1-1.

# pacman -Syu "bugzilla>=5.0.1-1"

The problem has been fixed upstream in version 5.0.1.

Workaround
=========
None.

Description
==========
Login names (usually an email address) longer than 127 characters are
silently truncated in MySQL which could cause the domain name of the
email address to be corrupted. An attacker could use this vulnerability
to create an account with an email address different from the one
originally requested. The login name could then be automatically added
to groups based on the group's regular expression setting.
This vulnerability has been demonstrated by truncation of an
@mozilla.com. address to an @mozilla.com address that
resulted in an unauthorized account creation with the default privileges
of the mozilla group.

Impact
=====
A remote attacker is able to obtain default privileges for an arbitrary
domain name by placing that name in a substring of an address resulting
in unauthorized account creation.

References
=========
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4499
https://www.bugzilla.org/security/4.2.14/
https://bugzilla.mozilla.org/show_bug.cgi?id=1202447
https://bugs.archlinux.org/task/46573

ArchLinux: 201510-4: bugzilla: unauthorized account creation

October 8, 2015

Summary

Login names (usually an email address) longer than 127 characters are silently truncated in MySQL which could cause the domain name of the email address to be corrupted. An attacker could use this vulnerability to create an account with an email address different from the one originally requested. The login name could then be automatically added to groups based on the group's regular expression setting. This vulnerability has been demonstrated by truncation of an @mozilla.com. address to an @mozilla.com address that resulted in an unauthorized account creation with the default privileges of the mozilla group.

Resolution

Upgrade to 5.0.1-1. # pacman -Syu "bugzilla>=5.0.1-1"
The problem has been fixed upstream in version 5.0.1.

References

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4499 https://www.bugzilla.org/security/4.2.14/ https://bugzilla.mozilla.org/show_bug.cgi?id=1202447 https://bugs.archlinux.org/task/46573

Severity
Package : bugzilla
Type : unauthorized account creation
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE

Workaround

None.

Related News