Vulnerability Description
The Bugzilla::Search::build_subselect function in Bugzilla 2.x and 3.x before 3.6.13 and 3.7.x and 4.0.x before 4.0.10 generates different error messages for invalid product queries depending on whether a product exists, which allows remote attackers to discover private product names by using debug mode for a query.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Bugzilla | <= 3.6.12 |
Related Weaknesses (CWE)
References
- http://www.bugzilla.org/security/3.6.12/Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:066
- https://bugzilla.mozilla.org/show_bug.cgi?id=824399
- http://www.bugzilla.org/security/3.6.12/Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:066
- https://bugzilla.mozilla.org/show_bug.cgi?id=824399
FAQ
What is CVE-2013-0786?
CVE-2013-0786 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The Bugzilla::Search::build_subselect function in Bugzilla 2.x and 3.x before 3.6.13 and 3.7.x and 4.0.x before 4.0.10 generates different error messages for invalid product queries depending on wheth...
How severe is CVE-2013-0786?
CVE-2013-0786 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-0786?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Bugzilla.