Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2008-2105

Опубликовано: 07 мая 2008
Источник: nvd
CVSS2: 3.5
EPSS Низкий

Описание

email_in.pl in Bugzilla 2.23.4, 3.0.x before 3.0.4, and 3.1.x before 3.1.4 allows remote authenticated users to more easily spoof the changer of a bug via a @reporter command in the body of an e-mail message, which overrides the e-mail address as normally obtained from the From e-mail header. NOTE: since From headers are easily spoofed, this only crosses privilege boundaries in environments that provide additional verification of e-mail addresses.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.16_rc2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.17.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.23:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.23.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.23.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.23.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:2.23.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*

EPSS

Процентиль: 65%
0.00497
Низкий

3.5 Low

CVSS2

Дефекты

CWE-264

Связанные уязвимости

ubuntu
больше 17 лет назад

email_in.pl in Bugzilla 2.23.4, 3.0.x before 3.0.4, and 3.1.x before 3.1.4 allows remote authenticated users to more easily spoof the changer of a bug via a @reporter command in the body of an e-mail message, which overrides the e-mail address as normally obtained from the From e-mail header. NOTE: since From headers are easily spoofed, this only crosses privilege boundaries in environments that provide additional verification of e-mail addresses.

redhat
больше 17 лет назад

email_in.pl in Bugzilla 2.23.4, 3.0.x before 3.0.4, and 3.1.x before 3.1.4 allows remote authenticated users to more easily spoof the changer of a bug via a @reporter command in the body of an e-mail message, which overrides the e-mail address as normally obtained from the From e-mail header. NOTE: since From headers are easily spoofed, this only crosses privilege boundaries in environments that provide additional verification of e-mail addresses.

debian
больше 17 лет назад

email_in.pl in Bugzilla 2.23.4, 3.0.x before 3.0.4, and 3.1.x before 3 ...

github
больше 3 лет назад

email_in.pl in Bugzilla 2.23.4, 3.0.x before 3.0.4, and 3.1.x before 3.1.4 allows remote authenticated users to more easily spoof the changer of a bug via a @reporter command in the body of an e-mail message, which overrides the e-mail address as normally obtained from the From e-mail header. NOTE: since From headers are easily spoofed, this only crosses privilege boundaries in environments that provide additional verification of e-mail addresses.

EPSS

Процентиль: 65%
0.00497
Низкий

3.5 Low

CVSS2

Дефекты

CWE-264