Vulnerability Description
The User.offer_account_by_email WebService method in Bugzilla 2.x and 3.x before 3.4.13, 3.5.x and 3.6.x before 3.6.7, 3.7.x and 4.0.x before 4.0.3, and 4.1.x through 4.1.3, when createemailregexp is not empty, does not properly handle user_can_create_account settings, which allows remote attackers to create user accounts by leveraging a token contained in an e-mail message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Bugzilla | 2.0 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2011-12/0184.html
- http://www.bugzilla.org/security/3.4.12/Vendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=711714
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72042
- http://archives.neohapsis.com/archives/bugtraq/2011-12/0184.html
- http://www.bugzilla.org/security/3.4.12/Vendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=711714
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72042
FAQ
What is CVE-2011-3667?
CVE-2011-3667 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The User.offer_account_by_email WebService method in Bugzilla 2.x and 3.x before 3.4.13, 3.5.x and 3.6.x before 3.6.7, 3.7.x and 4.0.x before 4.0.3, and 4.1.x through 4.1.3, when createemailregexp is ...
How severe is CVE-2011-3667?
CVE-2011-3667 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3667?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Bugzilla.