HTTP: Bugzilla process_bug.cgi ';' Exploit

This signature detects attempts to exploit a known vulnerability against process bug.cgi script in Bugzilla. Versions 2.10 and prior are susceptible. Attackers can send a semi-colon as an argument to the script, followed by arbitrary shell commands. A successful attack might allow arbitrary command execution on the affected machine.

Extended Description

Bugzilla is a web-based bug-tracking system based on Perl and MySQL. It allows people to submit bugs and catalogs them. Bugzilla is prone to a vulnerability which may allow remote users to execute arbitrary commands on the target webserver. When accepting a bug report, the script "process_bug.cgi" calls "./processmail" via a perl system() call argumented by a number of paramaters with values originating from user input via a web-form. There are no checks against these values for shell metacharacters by the script before insertion into the system() call. As a result, it possible for an attacker to supply maliciously crafted input to form fields, which when submitted will cause arbitrary commands to be executed on the shell of the host running vulnerable versions of Bugzilla. Commands will be executed with the privileges of the webserver process.

Affected Products

Mozilla bugzilla

Short Name
HTTP:CGI:BUGZILLA-SEMICOLON
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
';' Bugzilla CVE-2000-0421 Exploit bid:1199 process_bug.cgi
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Mozilla

CVSS Score

7.5

Found a potential security threat?