7.1
CVSSv2

CVE-2008-4437

Published: 03/10/2008 Updated: 08/08/2017
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
VMScore: 715
Vector: AV:N/AC:M/Au:N/C:C/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in importxml.pl in Bugzilla prior to 2.22.5, and 3.x prior to 3.0.5, when --attach_path is enabled, allows remote malicious users to read arbitrary files via an XML file with a .. (dot dot) in the data element.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla bugzilla 2.22.2

mozilla bugzilla 2.22.3

mozilla bugzilla 2.4

mozilla bugzilla 2.6

mozilla bugzilla 3.1.3

mozilla bugzilla 2.22.4

mozilla bugzilla 2.23

mozilla bugzilla 2.8

mozilla bugzilla 2.9

mozilla bugzilla 2.23.1

mozilla bugzilla 2.23.2

mozilla bugzilla 3.0.2

mozilla bugzilla 3.1.2

mozilla bugzilla 2.22.1

mozilla bugzilla 2.23.3

mozilla bugzilla 2.23.4

mozilla bugzilla 3.1.1

mozilla bugzilla 3.1.4

Exploits

source: wwwsecurityfocuscom/bid/30661/info Bugzilla is prone to a directory-traversal vulnerability because the application fails to sufficiently sanitize user-supplied input Exploiting this issue will allow an attacker to view arbitrary local files within the context of the server Information harvested may aid in launching further att ...